Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (1,568)
  • Danish
  • 2020-2024  (1,568)
  • 1930-1934
  • Internet videos  (1,568)
Datasource
Material
Language
Years
Year
Keywords
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835464694 , 1835464696
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Software architecture ; Python (Computer program language) ; Interfaces de programmation d'applications ; Architecture logicielle ; Python (Langage de programmation) ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers a detailed exploration of FastAPI, a cutting-edge Python framework for API development. The course starts with basic API and REST principles, quickly advancing to practical application for a thorough understanding of both theory and practice. The curriculum progresses logically, starting with the basics of FastAPI, including app setup, API routing, linting, and formatting. Participants will create a social media API, manage post and comments, and learn code organization with APIRouter, followed by practical testing experience using pytest. A significant portion of the course focuses on asynchronous databases, vital for scalable application development. It covers database setup, connection, and integration within FastAPI. The course also delves into Python logging techniques, crucial for debugging and monitoring FastAPI applications. It also covers user authentication, an essential element in modern web apps. It includes practical training on JWTs, password hashing, authentication management, and database user relationships, alongside addressing many-to-many database relationships and user email confirmation strategies. In later stages, the course addresses advanced topics like file uploads, background image generation tasks, and deployment methodologies, including continuous integration with GitHub Actions. What you will learn Build and structure a FastAPI application Implement and test RESTful APIs with FastAPI Manage asynchronous database operations Configure and utilize Python logging in FastAPI Secure applications with user authentication and JWTs Handle complex database relationships Deploy FastAPI applications and manage them effectively Audience This course is ideal for aspiring back-end developers, testers looking to integrate automation into their workflows, and front-end developers seeking a deeper understanding of server-side processes. This course will particularly benefit those with a basic grasp of programming and a desire to specialize in the fast-paced realm of web development, API construction, and database management using FastAPI. Prior programming experience in any language is recommended; beginners should consider a basic Python course first, as all required software is provided for free. About the Author Jose Salvatierra Fuentes: Jose, a passionate educator in the realm of coding and software development, has dedicated over 7 years to teaching online. He founded Teclado with a vision to democratize software development education, striving to ensure comprehensive understanding for his students. His approach makes learning coding a clear, rewarding journey, connecting the dots that once seemed obscure. Specializing in Python and JavaScript, Jose excels in web and backend development. He's proficient in various libraries and frameworks, including Flask, React, React Native, and AngularJS. His expertise extends to working with UNIX systems, MongoDB, PostgreSQL, and crafting advanced system architectures. Jose's commitment is to make the learning process both efficient and enjoyable, guiding students to mastery in software development.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138297947 , 0138297940
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Web site development ; Web applications ; Python (Langage de programmation) ; Programmation (Informatique) ; Sites Web ; Développement ; Applications Web ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 2.5 Hours of Video Instruction Explore Python's capabilities for Data Science and Machine Learning, the topics of greatest import these days in the tech world. Python has risen to popularity as one of the most versatile and beginner-friendly programming languages. Its simplicity, readability, and extensive libraries make it a powerful language for a wide variety of different domains. It's widely used in web development, data analysis, scientific computing, artificial intelligence, and automation. Python's versatility and large community support make it an excellent language to kickstart your programming journey. This course offers a hands-on approach to building your Python skills through a series of practical projects from scratch. Hone your expertise in areas such as data analysis, machine learning, web scraping, and more. Related Learning: Watch and learn from Shaun's other videos: Functional Programming Projects with Python 3 About the Instructor: Shaun is a Senior Software Developer who specializes in Full-stack development and Software Architecture. He manages teams of developers, as well as teaches many hundreds of thousands more how to create enterprise-ready applications. Shaun's online courses have over 300,000 learners largely because of his passion for development and his focus on helping people apply their programming skills in the real world. He is a life-long programmer and problem-solving addict whose goal is to help people solve meaningful problems by mastering the art of software development. Please don't hesitate to get in touch with him about any opportunities or if you'd like to stay up to date on his other courses and live trainings. Skill Level: Intermediate-Advanced What You Will Learn: Each project will include some different aspect of data science/ machine learning with Python that it will be both accessible and engaging while you advance your skill set. Perform Sentiment Analysis on real-world text Work with Image Recognition Tools Scrape Basic Data from Websites And much more! Who Should Take This Course: Job titles: Software developer, Data analyst/scientist, Machine Learning Engineer, Web Developer, DevOps Engineer. Course Requirements: Prerequisites: Python experience and app development background About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Observability is more difficult in the era of large language models, while insight into your code's behavior is increasingly more important. Join Sam Newman and Jessica Kerr for a discussion about the impact of AI on software production. They explore what happens when deterministic work (software development) meets nondeterministic work (GenAI) and examine some of the limitations of communicating with an AI at scale. This event is for anyone who builds or maintains software and is looking to better understand the intersection of GenAI and observability. What's New in Software Development gives you a chance to explore trending topics in software development and to hear from Sam and Jessica Kerr about software development, how to begin implementing AI tooling into your own work, and their own career journeys. They will spend a few minutes covering the trends that are influencing software development and then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it How to start thinking about integrating GenAI into your production lifecycle How to use observability to gain insight into how your code behaves in production This live course is for you because... You want to hear from Sam Newman and Jessica Kerr about how software development is changing. Recommended Follow-Up: Read Observability Engineering (book).
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Natural language processing (Computer science) ; Intelligence artificielle ; Traitement automatique des langues naturelles ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Responsible Generative AI and Local LLMs Learning Generative AI During Live Coding This video series covers mastering the theory of Generative AI and using local LLMs like Mistral, llamafile, Candle, and Lorax. Lessons covered include: Profit Sharing Concepts Tragedy of the Commons Game Theory and Generative AI Perfect Competition Negative Externalities Fine-tuning Mistral with Ludwig Getting Started with llamafile Hello World in Candle Exploring Rust and Candle Transcribing Audio with Whisper Rust for LLMs Learning Objectives Learn about responsible and ethical uses of generative AI Getting hands-on with local LLMs like Mistral, llamafile, Candle, and Lorax Learning to build solutions by coding along during tutorials Learning the key syntax and features of the Rust Language Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 620.0068
    Keywords: Engineering Management ; Leadership ; Technology Management ; Ingénierie ; Gestion ; Leadership ; Technologie ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join host Michael Lopp, senior vice president at Apple, and his guest Will Larson, chief technology officer at Carta, as they demystify engineering strategy and discuss how these critical documents are much easier to create--and to support--than most people appreciate. You'll explore the common reasons why many organizations do not have a formal engineering strategy and learn about a proven process for creating one. This event is for you if you want to better understand engineering strategy, learn best practices for making one, or help drive and support strategy in your organization. Tech Leadership Tuesday is a dynamic monthly live event that helps empower people and technology leaders to become more effective and successful in their leadership roles. Each episode delves into a relevant topic for engineering leaders and, through a conversation between a host and guest, you'll learn about common challenges, best practices, and lessons learned from the guest's experience. What you'll learn and how you can apply it The importance of having a written engineering strategy How to create an engineering strategy What to avoid when writing an engineering strategy This live course is for you because... You want to hear from Michael Lopp and Will Larson about creating and implementing engineering strategy. You want to learn how to draft an engineering strategy. Recommended follow-up: Read The Engineering Executive's Primer (early release book by Will Larson) Read The Art of Leadership (book by Michael Lopp) Take Executive Leadership Fundamentals in 60 Minutes (on-demand course with Karen Walker).
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886922 , 1835886922
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into Cisco's networking environment, covering foundational concepts such as network component roles and the Cisco CLI. It progresses through network topology, IPv4 and IPv6 addressing, and essential networking principles like virtualization, wireless configurations, and switch functionalities. The course is designed to build a comprehensive understanding of network infrastructure and cybersecurity basics. Focusing on practical applications, you will gain hands-on experience in configuring and managing Cisco networks. The course emphasizes VLAN configuration, Interswitch connectivity, routing protocols, and network security implementations. Through real-world scenarios, you will explore DHCP, NTP, and DNS in network management, alongside configuring static and dynamic routing, understanding ACLs, and navigating network address translation. The course concludes with advanced topics in network management and security. The course also introduces network management automation, SDN architecture, and REST-based APIs application. This course will ensure you are well-equipped for intermediate to advanced roles in network administration and security, with a robust skill set for navigating complex networking environments. What you will learn Understand network component roles and functions Analyze different network topology characteristics Configure IPv4 and IPv6 addresses on devices Gain insights into wireless configuration and security Learn routing components and packet forwarding techniques Implement network security through ACLs and NAT Audience This course is ideal for aspiring network administrators, IT professionals, and students seeking foundational knowledge in networking. This course is perfect for those preparing for the Cisco CCNA (200-301) certification, aiming to acquire a comprehensive understanding of network security, protocols, and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138298432 , 0138298432
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Audiobooks ; Livres audio
    Abstract: This is the one stop shop for all What's New in Software Development interviews of 2024 in their audio format. Keep up-to-date with Sam Newman and his colleagues on their software development journeys.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; Technology Leadership ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Technologie de l'information ; Gestion ; Technologie ; Leadership ; Audiobooks ; Livres audio
    Abstract: This is the one stop shop for all of the 2024 Tech Leadership Tuesday interviews in their audio format. Keep up-to-date with Michael Lopp and his colleagues on their tech leadership journeys.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: ChatGPT ; Git (Computer file) ; Computer programming ; Natural language processing (Computer science) ; Artificial intelligence Computer programs ; Programmation (Informatique) ; Traitement automatique des langues naturelles ; Intelligence artificielle ; Logiciels ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive deep into the world of AI with our ChatGPT coding masterclass. Whether you're new to coding or seeking to expand your skillset, this course will guide you step by step, ensuring that you become proficient in leveraging the potential of ChatGPT across multiple programming languages. Course Highlights: A Comprehensive Introduction: Familiarize yourself with the inner workings of ChatGPT, its advantages and disadvantages in the realm of AI chatbots, and how it compares to other chatbots available in the market. Smooth Onboarding: Get up and running quickly with guided instructions on account setup, essential installations, and writing your first ChatGPT command. Gaming with Javascript and ChatGPT: Unearth the symbiotic relationship between JavaScript and ChatGPT. Craft engaging games such as timers and Tic-Tac-Toe, all powered by the intelligence of ChatGPT. Expand Your Web Development Skills: Dive into the React.JS ecosystem. From initial installations to understanding components in ChatGPT and mastering routing, this section melds the worlds of modern web development with conversational AI. Conversational Coding with C++: For those looking to venture into more traditional coding paradigms, the course provides a robust introduction to C++ in tandem with ChatGPT. Create intriguing applications like a guess-the-number game while honing your C++ skills. Advanced Bot Functions and Data Visualization: Go beyond chat and dive into practical, real-world applications. Develop an OTP password generator, visualize data with histograms, and work with aggregate and time series data plots--all while harnessing the power of ChatGPT. This masterclass is not just a course but a comprehensive journey, transforming you from a curious learner to a ChatGPT coding maestro. With its blend of foundational knowledge, practical applications, and forward-thinking integrations, this course is designed to appeal to a broad audience.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 519.5/37
    Keywords: Correlation (Statistics) ; Mathematical statistics ; Corrélation (Statistique) ; correlation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: These videos are a series of shorts explaining critical data science concepts through visuals and concise explanations. By learning these fundamentals in bite-sized format, you can digest concepts that are core in machine learning and statistical modeling. Problems like bias and spurious correlations can become easier to grasp as well. Topics include Bayes Theorem, probability distributions, mathematical notation, correlation coefficients, linear regression, and logistic regression.
    Note: "Shortcuts.". - Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Understanding the core concepts of LLMs is a must-have skill today. This video collection introduces the core concepts you need to know, whether you are a developer or a non-technical person. Learn the components of LLMs, such as the transformer model, context windows, parameters, tokens and more.
    Note: "Shortcuts.". - Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) Computer programs ; Neural networks (Computer science) ; Génération automatique de texte ; Logiciels ; Réseaux neuronaux (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive course, designed for budding developers and tech enthusiasts, delves deep into the fascinating world of AI chatbot development using two powerful tools: React.js and OpenAI's ChatGPT. With a focus on practical, hands-on learning, the course guides you through every step of creating a dynamic, AI-powered chatbot application. Spanning several detailed modules, the course begins with a solid foundation in React.js, a popular JavaScript library for building user interfaces. You'll learn to set up your development environment and understand the basics of React components, state management, and the overall architecture of a React application. This knowledge is crucial as you start to build the layout and interface of your chatbot. The heart of the course lies in the integration of ChatGPT, OpenAI's advanced AI language model. You'll explore how to seamlessly incorporate ChatGPT into your React application, creating a responsive, intelligent chatbot. The course covers essential topics like API integration, handling user inputs, and generating AI responses, ensuring your chatbot is both functional and engaging. API integration is a key focus, as you'll learn to connect your React app with ChatGPT through a backend, using Node.js and Express.js. This section includes practical exercises on setting up servers, managing API requests and responses, and ensuring smooth communication between your front end and the AI model. UI/UX design: you'll learn to create an intuitive, user-friendly interface for your chatbot, ensuring a seamless user experience. The course covers advanced UI topics such as styling, layout design, and incorporating interactive elements, making your chatbot not only smart but also visually appealing. By the end of this course, you'll have a fully functional AI chatbot, and more importantly, a deep understanding of integrating AI technologies with web development. Whether you;re a beginner looking to enter the world of AI and React, or a developer seeking to expand your skillset, this course offers valuable knowledge and hands-on experience in the cutting-edge field of AI chatbots. Distributed by Manning Publications This course was created independently by Skool of AI (Owned by Meta Brains) and is distributed by Manning through our exclusive liveVideo platform.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 24 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of artificial intelligence with this comprehensive course designed to unravel the intricacies of Bard AI, Google's pioneering language model that stands at the forefront of AI technology. Spanning over seven insightful sections, the course offers a deep dive into Bard AI's capabilities, setting a foundation with an introduction to AI and language models, followed by an in-depth exploration of Bard AI's unique features. Discover the revolutionary aspects of text generation, contextual understanding, and multilingual support that Bard AI offers. These features not only enhance the efficiency of content creation but also pave the way for innovative applications in customer service, education, and more. The course meticulously compares Bard AI with other leading models like GPT-3 and GPT-4, highlighting its unique selling points and potential areas for development. A crucial section of the course is dedicated to programmers, where you'll learn how Bard AI can assist in coding practices, from generating code snippets to identifying errors and improving performance. The course also projects the prospects of Bard AI, envisioning its role in advancing society and technology. By the end of this course, you'll have a comprehensive understanding of Bard AI, equipped with the knowledge to apply its features in various sectors effectively. Whether you're a programmer, content creator, or simply an AI enthusiast, this course is your gateway to mastering one of the most versatile language models in the AI landscape. Distributed by Manning Publications This course was created independently by Skool of AI (Owned by Meta Brains) and is distributed by Manning through our exclusive liveVideo platform.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Electronic spreadsheets Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've ever wondered how to enhance your data visualisation skills and make meaningful insights at a glance, this one's for you. In this lesson, we'll explore the power of icon sets within Excel's conditional formatting feature. Icon sets are a fantastic tool for visualising data trends, and we'll guide you through applying and customising them to suit the specifics of your data. So, let's dive in and make your Excel spreadsheets not only informative but visually compelling! Learning Objectives Apply and customise icon sets in Excel's conditional formatting to visually represent data trends and make informed data analysis decisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this lesson, we tackle the challenge of identifying data in a list using the IF function with a partial match. Imagine you're a fruit supplier armed with a spreadsheet containing customer names and their favourite fruits based on purchase data. Your task? To identify if the fruit listed in column B is a berry and label it accordingly in column D. We'll attempt an initial IF statement with a wildcard to find berries. Surprisingly, it won't work due to wildcard limitations in IF. So, join us in this lesson as we navigate the nuances of partial matching in Excel - with fruitful results! Learning Objectives Identify and categorise data with partial matches with IF, SEARCH, and ISNUMBER functions.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've ever needed to determine the end date of a project based on workdays (excluding weekends and holidays), this is the lesson for you. We explore three lesser-known functions in Excel: Workday, NetworkDays, and NetworkDays.intel. You'll learn how to integrate these functions into your formulas effectively. Whether you're managing projects and schedules or need to track days for any other reason, this lesson provides practical insights to boost your productivity. Learning Objectives Discover Excel's Workday, NetworkDays, and NetworkDays.intel functions.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Understanding the core concepts of LLMs is a must-have skill today. This video collection introduces the core concepts you need to know, whether you are a developer or a non-technical person. Learn the components of LLMs, such as the transformer model, context windows, parameters, tokens and more.
    Note: "Shortcuts.". - Online resource; title from title details screen (O'Reilly, viewed April 15, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Open source intelligence ; Computer security ; Renseignements de sources ouvertes ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Open Source Intelligence (OSINT), the gathering of information from publicly available sources, is a critical skill for defensive and offensive cybersecurity. Many professionals that use OSINT as part of their jobs lack a comprehensive and systematic view of the concepts, tools, and techniques for gathering, analyzing, and interpreting data. This course provides a structured path for learning crucial OSINT skills, including search techniques, source evaluation, social media analysis, and ethical considerations. Learners will discover how to leverage OSINT in intelligence gathering, investigations, risk assessment, and decision-making processes.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 15, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.5
    Keywords: Product management ; Produits commerciaux ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "This six-module course teaches product managers how to choose a product to design, create a business case, work with engineering, and bring it to market. It will train current and aspiring product managers how to perform market research, understand a product life-cycle process, and successfully define, develop, launch, and promote new products. The modules are intended for anyone with no prior product management experience who wants to work in that capacity in a tech business or startup, as well as aspiring founders who want to learn more about the product management process. What you'll learn and how you can apply it The purpose of this course is to provide a fundamental understanding of new product design and development ideas. It presents essential management concerns in new product design; cutting-edge new product ideation, design, development, and marketing approaches. The goal of the product management module is to walk through the product management life cycle, from inception to growth and launch, while taking customer feedback into consideration and implementing effective tools, processes, and determination to create a scalable product and manage it until its end of life. It covers the product life cycle, market research, competitive analysis, market and pricing strategies, product roadmaps, and the people skills necessary to effectively influence and negotiate. It will give you practical, actionable advice on how to create and capture value as a Product Manager, with a focus on the fundamental concepts that underpin successful product creation and management across industries and individual businesses. Bridging the gap between ""strategy"" and ""implementation"" Learn and implement Product Management tools Prioritize your time and pick your battles (backlog) Collect and analyze customer and market feedback Prioritize and effectively communicate needs to technical teams Manage Technology Roadmaps effectively Guarantee successful product lifecycle management while mitigating product safety risks This course is for you because... You're a product manager with 1-4 years of experience who needs to deliver a product from initiation to decline and expansion. You have basic product management life cycle knowledge, from defining product problem statements, market assessment, technology roadmap, development, and go-to market. You have previous product management experience in charge of a team of at least five developers or cross-functional engineering teams (or if you would like to lead a team of five developers or more). Prerequisites Read: Practical Product Management for Engineers by Nehal Patel, Co-author Philip Hoang (book) Complete: Professional Development by Eric Roulo (Owner Roulo Consulting Inc.) Roulo Consulting Inc - Professional Development Reading/Writing Assignment".
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204459 , 1836204450
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/17
    Keywords: Python (Computer program language) ; Application software Development ; Python (Langage de programmation) ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Abstracting with Functions"" is a meticulously curated video course designed for technical professionals eager to master the art of function creation in Python. Through a comprehensive series of videos, learners are taken on a journey that begins with the basics of what functions are and why they are pivotal in programming. The course underscores the significance of functions in collecting logic into reusable chunks, thereby fostering more readable and maintainable codebases. Starting with an introductory overview, the course swiftly moves to dissect the anatomy of functions, from the simplest forms without arguments to more complex functions featuring multiple positional and keyword arguments. Each episode, hosted by dynamic duos such as Aubri and Ronnie or Justin and Zach, not only discusses the syntax and theoretical aspects but also delves into practical demonstrations and the subtleties of function creation, such as edge cases and argument types. The importance of understanding functions is also linked to professional development, highlighting their relevance in networking and certification exams. By the end of the course, learners will have a solid grasp of how to efficiently abstract logic through functions, enabling the construction of more sophisticated and scalable programs. What you will learn Understand the fundamental concept of functions. Explore the syntax and creation of functions in Python. Distinguish between various types of functions. Learn advanced topics such as keyword arguments. Use mixed arguments to enhance function versatility. Grasp the significance of functions in different contexts. Audience Individuals at the beginning of their coding journey who want to learn best practices early on, and those with some experience in Python or other programming languages looking to deepen their understanding of functions and how to use them more effectively in their projects will find this course quite useful. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836202530 , 1836202539
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; JavaScript (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is a comprehensive training program designed for IT beginners and network students eager to delve into the fundamentals of network security. In today's digital age, safeguarding information and data is of paramount importance, and this course equips participants with the essential knowledge and skills to excel in the field of cybersecurity. This course is ideal for individuals with a basic understanding of Linux programming, and it provides a solid foundation in network defense and information security. Our primary goal is to enable trainees to reach competency and expertise in network defense and information security skills, ensuring they are well-prepared to navigate the complexities of the digital landscape. The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836207856 , 1836207859
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 47 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: ChatGPT ; React (Electronic resource) ; Artificial intelligence ; Web applications Programming ; Intelligence artificielle ; Applications Web ; Programmation ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This meticulously designed course not only introduces you to the foundational aspects of React.js but also dives deep into integrating ChatGPT API, crafting a cutting-edge, AI-driven chat interface. Beginning with an introduction to React components and props, you'll quickly move on to master state management, essential for responsive and interactive UIs. As the course unfolds, you'll learn how to construct a chat window component, handle user inputs, and engage with the ChatGPT API using Axios for real-time, intelligent conversations. The curriculum is carefully structured to ensure a progressive learning path, from setting up a MySQL environment, through managing and manipulating data, to advanced querying techniques including JOINS and indexes for optimization. Moreover, you'll explore advanced features such as error handling with boundary components and adding polish to your application through CSS styling and loading indicators. The course culminates in a practical deployment phase, where you'll take your local development project to a global audience using Vercel, equipping you with the knowledge to launch your applications into the production environment confidently. What you will learn Create and manage React components and props Utilize React state for dynamic content updates Integrate the ChatGPT API with Axios for AI interactions Implement localStorage() for persistent data storage Secure app configurations with environment variables Design user interfaces with CSS and add loading indicators Audience Ideal for web developers, software engineers, and UI/UX designers looking to enhance their skill set in building AI-driven applications. Prerequisites include basic knowledge of JavaScript, HTML, and CSS. About the Author Eduonix Learning Solutions: Eduonix Learning Solutions creates and distributes high quality technology training content. Our team of industry professionals have been training manpower for more than a decade. We aim to teach technology the way it is used in industry and professional world. We have professional team of trainers for technologies ranging from Mobility, Web to Enterprise and Database and Server Administration.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 22, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Understanding the core concepts of LLMs is a must-have skill today. This video collection introduces the core concepts you need to know, whether you are a developer or a non-technical person. Learn the components of LLMs, such as the transformer model, context windows, parameters, tokens and more.
    Note: "Shortcuts.". - Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 53 min.)) , sound, color.
    Edition: Video edition.
    DDC: 005.8
    Keywords: Microsoft Azure (Computing platform) Security measures ; Cloud computing Security measures ; Microsoft Azure (Plateforme informatique) ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you'll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the Technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the Book Azure Security details best practices for configuring and deploying Azure's native security services--from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Quotes Tells an end-to-end story, from introductory cyber-security foundations to advanced security tooling in Azure. - Yuri Diogenes, Microsoft Cloud Security Provides excellent coverage of key security capabilities in and around Azure, with valuable guidance for beginners and experts alike. - Prashant Dwivedi, National Informatics Centre, India The most comprehensive and up-to-date content that I have seen on Azure Security. This book covers it all. - Michael Heil, ai.dopt.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135341674 , 0135341671
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Information technology Security measures ; Computer security Management ; Computer networks Security measures ; Data protection ; Technologie de l'information ; Sécurité ; Mesures ; Sécurité informatique ; Gestion ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 4+ hours of video instruction Gain an introductory understanding of secure operations and protections concepts. Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning. Throughout the video course, expert trainer, author and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. This video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations. Topics include: System and Network Architecture Concepts Efficiency and Process Improvement Recommended Controls to Mitigate Attacks and Software Vulnerabilities Analyzing Data to Prioritize Vulnerabilities About the Instructor: Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet's dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity. Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all around good guy." Skill Level: Beginner Learn How To: Protect data and secure an organizations operation in their day-to-day business Observe, collect, and secure date Detect common security encounters and be prepared for them Implement processes that allow communication of information in a correct and timely manner Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Deep learning (Machine learning) ; Machine learning ; Logistic regression analysis ; Apprentissage profond ; Apprentissage automatique ; Régression logistique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: These videos are a series of shorts explaining critical data science concepts through visuals and concise explanations. By learning these fundamentals in bite-sized format, you can digest concepts that are core in machine learning and statistical modeling. Problems like bias and spurious correlations can become easier to grasp as well. Topics include Bayes Theorem, probability distributions, mathematical notation, correlation coefficients, linear regression, and logistic regression.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Understanding the core concepts of LLMs is a must-have skill today. This video collection introduces the core concepts you need to know, whether you are a developer or a non-technical person. Learn the components of LLMs, such as the transformer model, context windows, parameters, tokens and more.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Understanding the core concepts of LLMs is a must-have skill today. This video collection introduces the core concepts you need to know, whether you are a developer or a non-technical person. Learn the components of LLMs, such as the transformer model, context windows, parameters, tokens and more.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881064 , 1835881068
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/65
    Keywords: SQL (Computer program language) ; Database management ; SQL (Langage de programmation) ; Bases de données ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This SQL mastery course offers a solid foundation in databases, emphasizing MySQL, a popular database management system. Starting with the essentials, learners are introduced to the pivotal role of databases in data management and given a primer on SQL, laying the groundwork for subsequent, more detailed study. The course is meticulously structured to guide you through setting up a MySQL environment, enabling practical engagement from the onset. As the course unfolds, you'll delve into designing databases and tables, learn to manage data through insertion, updating, and deletion, and explore the construction of basic to complex SQL queries for effective data retrieval. The course further advances into sophisticated SQL features like filtering with WHERE clause and operators, sorting and grouping data, and utilizing functions and aggregates for enhanced data analysis. A pivotal section on JOINs elucidates the intricacies of linking data across tables, while the final modules on indexes and optimization offer crucial insights into improving database performance. Each SkillSprint is designed to be both informative and hands-on, ensuring that by the end of the course, you'll possess a comprehensive understanding of SQL and MySQL, equipped with the skills to tackle real-world data management challenges. What you will learn Understand the fundamental concepts and roles of databases and SQL. Perform data manipulation tasks including inserting, updating, and deleting data. Construct basic and complex SQL queries for effective data retrieval. Apply sorting, grouping, and filtering techniques for data analysis. Utilize built-in functions and aggregates for advanced data operations. Implement various types of JOINs to link data across multiple tables. Audience Ideal for students, business analysts, project managers, software developers, data analysts, and career changers aiming to build or enhance their database management and SQL skills, particularly in MySQL. About the Author SkillSprints Inc., Mark Lassoff: SkillSprints Inc., founded by the visionary Mark Lassoff, specializes in teaching digitally accessible technical skills to people just getting started in their technical careers, including web development, digital design, and other career paths enabled by technology. SkillSprints has bridged the gap between entertainment and education, creating a unique, immersive learning experience that resonates with students. Their instructors are more than just tech-savvy professionals; they are educators first and foremost, handpicked for their unique ability to translate complex technological concepts into digestible, engaging lessons. SkillSprints continues to evolve, constantly innovating to stay at the forefront of the online learning landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836203995 , 1836203993
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Microsoft .NET Framework ; Computer programming ; C++ (Computer program language) ; Programmation (Informatique) ; C++ (Langage de programmation) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an extensive journey through the realms of C# and .NET, providing a solid foundation in programming concepts, best practices, and the development environment setup with Visual Studio. As you progress, you'll explore the core syntax of C#, delve into GitHub, and learn debugging and troubleshooting techniques that are crucial for real-world development. The course carefully layers complexity with topics on operators, conditional and repetition statements, error and exception handling, and string plus DateTime manipulation before advancing to more sophisticated concepts such as methods, arrays, collections, and object-oriented programming. You will also get acquainted with tools and frameworks like Maven and Gradle, enhancing your development workflow. By the end of this course, you'll have a comprehensive understanding of building and deploying dynamic, scalable applications using C# and .NET, ready to tackle challenges in modern software development. What you will learn Master the basics of C# programming and .NET framework. Utilize operators, conditional and repetition statements in C#. Perform string and DateTime manipulations. Create and use methods, arrays, and collections. Apply object-oriented programming principles using C#. Work with Maven and Gradle for project management. Audience Ideal for beginners in programming or professionals looking to deepen their knowledge in C# and .NET. Pre-requisites include a basic understanding of programming concepts and a keen interest in software development. About the Author Trevoir Williams: Trevoir Williams is a software engineer and part-time lecturer. With a master's degree in computer science, he has spent over a decade teaching web, software, and database development courses. He also has extensive industry experience in web application development, Azure Cloud system, and server administration. He enjoys teaching IT and development courses and hopes to impart knowledge of the latest developments in industry standards and techniques to his students.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135342107 , 0135342104
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 5 Hours of Video Instruction Explore key threat intelligence and threat hunting concepts to help you protect your sensitive data. A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. The Threat Intelligence and Threat Hunting, 2nd Edition video course provides learners with the knowledge and skills to fortify systems, protect sensitive data, and ensure compliance with privacy regulations. Throughout the course, expert trainer, author, and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard explanations to explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. By the end of this course, you will be able to protect sensitive data and ensure compliance with privacy regulations, secure systems and applications to prevent data exposure and advise your organization on privacy-by-design principles. Topics include: Threat-Intelligence and Threat-Hunting Concepts Analyze Indicators of Potentially Malicious Activity Tools or Techniques to Determine Malicious Activity Concepts Related to Attack Methodology Frameworks Utilizing Threat Intelligence to Support Organization Security Analyze Output from Common Vulnerability Assessment Tools Threats and Vulnerabilities Associated with Specialized Technology About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet's dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity. Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all around good guy." Skill Level: Beginner Learn How To: Apply key threat intelligence and threat hunting concepts Understand and classify hot attacks are taking advantage of vulnerabilities Use common vulnerability assessment methodologies Understand threats against Internet of Things, real-operating systems, and cloud-based environments Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 510.2/12
    Keywords: Mathematical notation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: These videos are a series of shorts explaining critical data science concepts through visuals and concise explanations. By learning these fundamentals in bite-sized format, you can digest concepts that are core in machine learning and statistical modeling. Problems like bias and spurious correlations can become easier to grasp as well. Topics include Bayes Theorem, probability distributions, mathematical notation, correlation coefficients, linear regression, and logistic regression.
    Note: "Shortcuts.". - Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 519.50285
    Keywords: Probabilities ; Mathematical statistics ; Computer science ; Probabilités ; Informatique ; probability ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: These videos are a series of shorts explaining critical data science concepts through visuals and concise explanations. By learning these fundamentals in bite-sized format, you can digest concepts that are core in machine learning and statistical modeling. Problems like bias and spurious correlations can become easier to grasp as well. Topics include Bayes Theorem, probability distributions, mathematical notation, correlation coefficients, linear regression, and logistic regression.
    Note: "Shortcuts". - Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Architecture logicielle ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: It's easy to assume that being a software architect is mostly about technical decision-making, but the job involves much more than that. So, what are the skills that make a software architect, and what do you need to know to succeed in the job? Join us to discover how to build the skills you need to step into a software architect role with confidence. You'll explore how to design distributed systems, work with architectural patterns, manage data, collaborate with teams, and more. By the time you're through, you'll understand why the answer to so many questions in software architecture is "It depends" and how to assess the trade-offs that will influence your decision-making. What you'll learn and how you can apply it Use architectural design patterns to make architectural choices Understand why architectural decisions are important and how to make them efficiently Think like a software architect and consider trade-offs effectively This live event is for you because... You're an aspiring software architect who wants to understand which skills you need to progress in your career. You're a software architect who wants to explore key skills in more detail. Recommended follow-up: Read Fundamentals of Software Architecture (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135339503 , 0135339502
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Go (Computer program language) ; Computer programming ; Web applications Programming ; Go (Langage de programmation) ; Programmation (Informatique) ; Applications Web ; Programmation ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 15+ Hours of Video Instruction Go is lightweight, simple, and perfect for modern cloud-native and microservices development. Overview Ultimate Go: Advanced Concepts Video Course provides an intensive, comprehensive, and idiomatic view of the Go programming language. This course focuses on both the specification and implementation of the language, including topics ranging from language syntax, design, and guidelines to concurrency, testing, and profiling. This class is perfect for anyone who wants a jump-start in learning Go or wants a more thorough understanding of the language and its internals. In this video training, William Kennedy starts by providing a deep and intensive dive into Go's language syntax, idioms, implementation, and specification. Then Bill guides you through the essential things you need to know about designing software in Go. With that strong foundation, Bill then teaches the language mechanics behind Go's concurrency primitives and covers all the things you need to know to design concurrent software. Finally, Bill covers the tooling Go provides for testing, tracing, and profiling your programs. About the Instructor William Kennedy is a managing partner at Ardan Studio in Miami, Florida, a mobile, web, and systems development company. He is also a coauthor of the book Go in Action, the author of the blog "GoingGo.Net," and a founding member of GoBridge, which is working to increase Go adoption through embracing diversity. Ardan Labs is a software development, consulting, staffing, and training organization that specializes in Go, DevOps, Rust, Kubernetes, Terraform, and Blockchain technologies. For over 12 years, Ardan Labs has been trusted by startups and Fortune 500 companies to train their engineers and develop highly technical software solutions. If you're eager to elevate your Go skills to an expert level, get in touch and we can point you to a solution that fits your needs! Skill Level Beginner Intermediate Learn How To Write better, more idiomatic, and performant code Focus on micro-level engineering decisions Use your new understanding of the internals to leverage the core tradeoffs on readability, simplicity and performance. Utilize data semantics, guidelines, mechanical sympathy, data-oriented design, and package-oriented design Structure your Go projects for the long term. Manage packages, modules, and dependencies Who Should Take This Course Those learning their first programming language Experienced programmers who want to take advantage of the power of GO Course Requirements You need to know how to program You need to understand and core concepts of working with computers (such as files, HTTP, memory management, other) Studied CS in school or have a minimum of two years of experience programming full-time professionally Be familiar with structural and object-oriented programming styles. Have worked with arrays, lists, queues and stacks Understand processes, threads and synchronization at a high level.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1068/5
    Keywords: Computer software Quality control ; Computer software Development ; Software engineering ; Logiciels ; Qualité ; Contrôle ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Getting out of tech debt can feel like a Sisyphean task. After weeks of work, the success case is to have the app working the way it used to. It's not uncommon for organizations to declare code bankruptcy and rewrite working systems from the ground up. How do we end up in this situation? How do we measure it? And how do we alleviate, or even better, prevent such a situation? Join expert Chelsea Troy to explore technical debt and its impact on an organization. You'll learn how this debt builds up, how to measure it, and how to zero in on areas of greatest need--identifying high-leverage code changes and prioritizing them over renovations. You'll also explore the skills that tech teams use to prevent and reduce tech debt so you can apply them in your own organization. What you'll learn and how you can apply it: By the end of this course, you should be able to marshal you team's morass of frustration around your technical debt into an actual plan with prioritized steps to reduce and control it. This course is for you because: You're an engineer who wants to understand and reduce tech debt. You work with engineers or manage large projects and want the code to work, and keep working, without burning out the team. Prerequisites: Experience leading technical teams or working with a code base that's becoming hard to maintain (useful but not required).
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Imagine a scenario where your work week is not the conventional Monday to Friday and you want to estimate project durations based on this unique schedule, excluding holidays. The tool of choice for this task is the NetworkDays.Intl function. The formula calculates the work days accurately and remains dynamic as you extend it across your dataset. Enhance your Excel skills with this lesson and ensure your project timelines align with your unique work schedule. Learning Objectives Explore the NetworkDays.Intl function in Excel to calculate project durations - including customised work days and excluding holidays.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Are you ready to transform your Excel game? In this lesson, we'll guide you through four essential efficiency tips that might just revolutionise how you work with Excel. We'll show you how to copy calculations directly from the status bar and streamline formula columns with paste values only. Plus, discover more about named ranges for navigation and formula creation. Ultimately, each tip is designed to enhance your efficiency and productivity. Learning Objectives Discover data navigation techniques, including copying calculations from the status bar, pasting values for streamlined formula columns, and using named ranges.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (12 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Small Language Models and LLamaFile Learning About Small Language Models and Running Them Locally with LLamaFile This video series covers small language models, their advantages, and how to run them locally using the LLamaFile tool. Lessons Covered Include: 1.1 Introduction to Small Language Models 1.2 Demo: Running Phi Small Language Model with LLamaFile 2.1 Getting Started with LLamaFile 2.2 Demo: Running Lava Multi-Modal Vision Model with LLamaFile Learning Objectives Understand what small language models are and their advantages Learn how to run local language models using the LLamaFile tool See demos of running different small language models like Phi and Lava Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138283131 , 0138283133
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 28 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Machine learning Study guides Examinations ; Cloud computing Study guides Examinations ; Artificial intelligence Study guides Examinations ; Apprentissage automatique ; Examens ; Guides de l'étudiant ; Intelligence artificielle ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 4+ Hours of Video Instruction Learn the techniques and approaches to successfully pass the AWS Certified Machine Learning - Specialty Exam with hands-on exercises. Getting the AWS Certified Machine Learning - certification highlights your versatility as an ML engineer. Usually, ML engineers focus on handling data and building models, so if you know can use cloud tools, it makes you an even more valuable as an MLOps engineer. You'll be able to ingest your own data, get through the feature engineering process, train and evaluate models, and deploy them to where they will be consumed. This certification shows that you know how to do full-stack ML development. In this series of videos, author Milecia McGregor shares a mix of slides and demonstrations in AWS, along with some examples in Visual Studio with Python. It's just what you need to learn to pass the exam. It includes an overview of concepts with hands-on work using AWS tools like Kinesis and EMR. About the Instructor: Milecia McGregor is a software generalist who has worked in numerous areas of tech over the past decade. With a master's degree in mechanical and aerospace engineering, Milecia has accomplished many groundbreaking projects over the years, including Machine Learning (ML) work for human-computer interfaces on autonomous vehicles; front-end and back-end; data science; robotics; DevOps; cybersecurity; VR; and more. Milecia is also an international speaker in the tech community, with talks covering a variety of topics across multiple programming languages. Skill Level: Intermediate Learn How To: Learn effective tips and techniques for passing the AWS Certified Machine Learning - Specialty exam Identify and implement data ingestion solutions with Kinesis Evaluate ML models Deploy ML models with AWS tools Course requirement: Prerequisites: Knowledge of how to use various AWS tools to deploy ML models into different environments Knowledge of.data engineering principles and model training and evaluatio Who Should Take This Course : Job titles: ML engineer, DevOps engineer, Aspiring ML engineer About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836205456 , 1836205457
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 38 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer algorithms ; Problem solving ; Algorithmes ; Résolution de problème ; algorithms ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Algorithmic Problem Solving"" is a cutting-edge video course tailored for those who seek to navigate the complexities of programming with ease and confidence. This comprehensive course begins by addressing the common hurdles newcomers face when diving into the world of programming. Through a series of engaging episodes, instructors Justin and Vonne, alongside Zach, guide learners through the art of algorithmic thinking, starting with foundational concepts and gradually advancing to more complex challenges. The course meticulously covers a range of topics from planning and implementing solutions for finding the maximum number in a list, reversing strings, detecting palindromes, applying title casing to strings, to coding a Caesar cipher. Each topic is designed to not only teach the technicalities of coding but also to sharpen problem-solving skills, thereby enhancing learners' ability to tackle any programming challenge with strategic thinking and precision. By the end of this journey, participants will have gained invaluable insights into algorithmic problem-solving that will serve as a cornerstone for their future projects, making their code more efficient, readable, and above all, effective. What you will learn Approach and solve programming problems algorithmically. Implement solutions for common coding challenges in Python. Enhance code readability and maintainability. Develop strategies for planning and coding algorithms. Apply concepts of string manipulation and data processing. Design algorithms for detecting patterns and encrypting data. Audience Ideal for beginner to intermediate programmers who have a basic understanding of Python or another programming language. No prior algorithmic or advanced mathematical knowledge is required, but familiarity with basic programming concepts is recommended to get the most out of the course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204473 , 1836204477
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: An immersive video course designed to introduce and deepen your understanding of Object-Oriented Programming (OOP) principles within the Python ecosystem. Through a hands-on approach, instructors Vonne and Justin guide you from the foundational setup and OOP basics--encapsulation, abstraction, inheritance, and polymorphism--to the creation of a dynamic text-based game, MonsterSlash. This course is structured to enhance your programming skills by applying OOP techniques to reduce code redundancy, promote reusability, and streamline your coding workflow. You'll embark on a project-driven learning path that not only solidifies theoretical concepts but also puts them into practice by developing a fully functional game. As the course progresses, you'll refine your game, add complexity, and implement advanced OOP strategies, culminating in version 2 of MonsterSlash that features enhanced gameplay elements. Whether you're a beginner eager to explore programming or an intermediate looking to sharpen your OOP skills in Python, this course offers valuable insights and skills for your development arsenal. What you will learn Set up your Python environment for OOP development. Understand and apply the four pillars of OOP in Python. Create, extend, and refine classes and objects. Develop a text-based game from scratch using OOP principles. Employ inheritance and composition to optimize your code. Refactor and enhance your game with advanced OOP techniques. Audience This course is ideal for individuals interested in Python programming, especially those curious about object-oriented programming. Beginners will find the course accessible, while intermediate programmers can deepen their OOP knowledge. Prior exposure to basic Python syntax is helpful but not required. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OfficeProTV and CreativeProTV channels. She has over a decade of experience teaching Office and Adobe applications both online and in the classroom. Certifications: Microsoft Office Master 2016.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Biocompatibility ; Intelligence artificielle ; Biocompatibilité ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Understanding the core concepts of LLMs is a must-have skill today. This video collection introduces the core concepts you need to know, whether you are a developer or a non-technical person. Learn the components of LLMs, such as the transformer model, context windows, parameters, tokens and more.
    Note: "Shortcuts.". - Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 25 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.74
    Keywords: PostgreSQL ; SQL (Computer program language) ; SQL (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: PostgreSQL is the leading open source database for online transaction processing. It serves as the main database for many applications and services, and is a crucial component of any architecture. Knowing how to best utilize PostgreSQL has a big impact on your application. This on-demand course covers the essentials of PostgreSQL, from performing basic administrative tasks to designing a schema to keep data clean and prevent issues down the road. Through a mix of concise demonstrations and interactive assessment, you will learn how to execute queries, identify potential optimizations, and use appropriate indexes to make queries quick and efficient. What you'll learn and how to apply it Module 1: By the end of this module, the learner will be able to understand PostgreSQL core concepts and architecture. Module 2: By the end of this module, the learner will be able to perform common administrative tasks, such as creating users, tables, constraints, and indexes. Module 3: By the end of this module, the learner will be able to perform query optimizations with indexes. This course is for you because You're a developer, DBA or sysadmin You work with databases You want to specialize in PostgreSQL Prerequisites Basic knowledge of SQL.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Orig.schr. Ausgabe: [日本語吹き替え版].
    Title: クリーンコード・クックブック = : Clean code cookbook with Maximiliano Contieri /
    Language: Japanese , English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [Nihongo fukikaeban].
    Series Statement: O'Reilly book club
    Uniform Title: Clean code cookbook (Streaming video)
    DDC: 005.1
    Keywords: Computer programming ; Coding theory ; Software engineering ; Computer software Development ; Programmation (Informatique) ; Génie logiciel ; computer programming ; Instructional and educational works ; Internet videos ; Matériel d'éducation et de formation ; Vidéos sur Internet
    Note: Originally produced in the United States in 2023. - Print version originally published in December 2023. - Edition statement from publisher's description. - Online resource; title from title details screen (O'Reilly, viewed April 2, 2024) , Japanese audio; text in English.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465578 , 1835465579
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: React (Electronic resource) ; Web site development ; Web applications Programming ; Sites Web ; Développement ; Applications Web ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the course, your gateway to mastering Recoil for React web development. Recoil, a powerful state management library by Facebook, revolutionizes app development with its simplicity and scalability. In this course, you will delve into Recoil's fundamentals, understanding why it's favored over Redux, and how it enhances React applications. Starting from scratch, you will learn to configure and use Recoil atoms and selectors, persist state data efficiently, and leverage advanced features like atom families. Embrace the transition from junior to senior developer by mastering Recoil's complexities, refining skills for scalable web and mobile applications, and acing declarative JavaScript solutions for interviews. Throughout the journey, you will build an app, progressing from the basics to advanced topics. Explore Recoil's nuances as we deep-dive into selector functionalities, state persistence mechanisms, and crafting performant logic for complex applications. By the end of this course, you will be equipped with a deep understanding of Recoil, confidently implementing scalable and high-performance state management in React applications. What you will learn Grasp Recoil's principles for popular state management Craft UI elements for better user interaction with Recoil Implement dynamic search filters with Recoil tools Persist data across sessions using recoil-persist Transition local to global state management through Recoil Build scalable state logic using advanced Recoil features Audience This course caters to a diverse audience, spanning junior to senior React developers eager to bolster their skill set. Beginners seeking a strong foundation in React and Recoil, intermediate developers aspiring to refine scalable code, and seasoned professionals keen on staying updated with modern industry requirements will all find immense value. Basic knowledge of JavaScript and React is recommended, but not mandatory, ensuring accessibility for learners at varying proficiency levels. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463444 , 1835463444
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Web site development Computer programs ; Application software Development ; Python (Computer program language) ; Sites Web ; Systèmes-auteur ; Logiciels d'application ; Développement ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Next.js is a popular open-source JavaScript framework designed to make web development with React efficient and scalable. Next.js adds layers of abstraction to React and simplifies the process of building modern web applications. It provides a set of conventions and features that enhance the development experience, making it easier to create performant and SEO-friendly applications. This comprehensive Next.js course unfolds by beginning with an introduction to web development fundamentals, as it progresses through React basics, advanced Next.js concepts, and real-world deployment strategies. We will explore key topics such as server-side rendering (SSR), client-side rendering (CSR), static site generation (SSG), and incremental static regeneration (ISR). The course offers hands-on experience with a final project, covering everything from structuring applications to optimizing for performance and SEO. The modular format accommodates varying skill levels, ensuring a well-rounded and practical learning experience for all learners. Upon completion of this Next.js course, you will become proficient in web development fundamentals, React essentials, and advanced Next.js concepts. Through hands-on experience, master server-side rendering, client-side rendering, dynamic routing, and performance and scalability in real-world scenarios. What you will learn Master SSR, CSR, and SSG for optimized web development Explore React basics and advanced component development in Next.js Implement Next.js best practices for efficient and scalable web applications Learn to create dynamic routes for versatile content handling Deploy fully functional applications using Vercel and Git/GitHub workflows Enhance applications for search engines and social platforms through metadata and SEO practices Audience This Next.js course is tailored for a diverse audience, catering to both entry-level and seasoned developers. Ideal for junior developers, it provides a strong foundation in web development fundamentals, React basics, and advanced Next.js concepts. Intermediate developers can enhance their skills and gain mastery in the latest features of Next.js. Senior web developers seeking to stay updated with modern concepts will find valuable insights for optimizing web applications. No programming experience is required, but basic web development and JavaScript understanding is desirable for the course. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883907 , 1835883907
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Artificial intelligence ; Apprentissage automatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is an innovative course tailored for those who aspire to master the dynamic fields of computer vision and generative artificial intelligence. This course offers a deep dive into the world of image recognition, object detection, and the magic of generative AI using tools like KerasCV, Python, TensorFlow, PyTorch, and JAX. This course guides you from the fundamentals of image classification to the intricacies of object detection, starting with the KerasCV library for deep learning. You'll learn to effectively use and fine-tune pre-trained models, create custom datasets for object detection, using tools like the LabelImg GUI program, and apply these skills to tackle real-world challenges. A key focus is the generative AI segment, particularly on Stable Diffusion, where you'll learn to generate detailed images from text, unlocking your creative potential in this advanced AI domain. This course offers a progressive learning path from basic concepts to advanced techniques, catering to both professional development and creative pursuits in AI. By the end, you'll have the confidence and tools needed for a variety of applications in the ever-evolving field of generative artificial intelligence. What you will learn Harness the power of the KerasCV library for efficient deep learning Master image classification techniques using pre-trained models Implement object detection in real-world scenarios Fine-tune models for tailored applications and datasets Create custom object detection datasets with LabelImg Understand the integration of TensorFlow, PyTorch, and JAX in computer vision Audience This course is ideal for individuals ranging from beginners to advanced learners who possess a fundamental understanding of machine learning and Python programming. It is especially beneficial for those keen on delving into the realm of computer vision using KerasCV. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138312923 , 0138312923
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Data encryption (Computer science) Study guides Examinations ; Computer security Study guides Examinations ; User interfaces (Computer systems) Study guides Examinations ; Cloud computing Study guides Examinations ; Chiffrement (Informatique) ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Interfaces utilisateurs (Informatique) ; Examens ; Guides de l'étudiant ; Infonuagique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Are you gearing up for the HashiCorp Certified Vault Associate exam? Look no further! Our comprehensive training program is designed to equip you with the essential skills needed to pass the certification and learn how to use Vault effectively in the field. The HashiCorp Certified Vault Associate video course provides: Effective Exam Preparation with all objectives in the exam covered in detail. Skills: Acquire the skills needed to use HashiCorp Vault in the terminal and web browser. Hands-On Labs: Participate in labs that empower you to gain experience using Vault within the CLI, UI, and API. Practice Quiz Questions: Access practice quiz questions for guided question breakdowns. See first-hand how to successfully navigate the exam, boosting your confidence and exam readiness. Related Learning: HashiCorp Certified Terraform Associate (003) by Dave Prowse About the Instructor: Dave Prowse has more than 20 years of experience in the IT field. He solves problems for organizations using Linux, infrastructure as code, and many other types of technology. He loves to teach these solutions to others. Dave is an advocate of lifelong learning, self-improvement, building confidence, and the sharing of knowledge. You can follow Dave at Prowse Tech: https://prowse.tech/ Skill Level: Intermediate Prerequisites What prior knowledge or experience do attendees need to get the most out of class? Understanding of core security concepts such as: encryption, authentication, tokens, and secrets Knowledge of cloud-based technologies Experience with Linux, Bash, Git and an IDE (such as VSCode) Course Set-up A computer system to work on and run Vault. As a best practice, it is recommended that attendees use a Linux virtual machine (Ubuntu, Debian, Fedora, etc...) for the labs, preferably with at least 2 CPUs and 4 GB RAM. The instructor will be demonstrating on a Debian virtual machine. To follow along with the labs, the system should have the following: The Vault CLI installed: https://developer.hashicorp.com/vault/docs/install VSCode installed: https://code.visualstudio.com/download Download this git repository: https://github.com/daveprowse/vac-course An AWS account with a separate IAM user (for testing purposes): https://aws.amazon.com/account/ Note: Attendees might incur a small charge from Amazon when running the AWS-based labs. Attendees can opt-out of running these labs and instead watch the instructor demos. Two monitors/systems recommended: One for the virtual machine, and one to watch the instructor demos.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/78
    Keywords: Cyberterrorism ; Cyberspace Security measures ; Risk management ; Cyberterrorisme ; Gestion du risque ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Electronic data processing Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this course we focus on preparing you for successfully sitting for the challenging CompTIA Data Plus DA0-001 exam. Data is considered the most important asset for enterprise organizations and as a data professional you will be able to provide immediate value to data driven organizations with the Data Plus certification. CompTIA Data+ is a very challenging exam and successful passing will validate that certified professionals have the skills required to facilitate data-driven business decisions and also provide immediate value to the enterprise. Data professionals must know about data mining, data manipulation, and visualizing and reporting data to stakeholders. So, whether applying basic statistical methods or analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle, a data professional is an important role to enterprises. This course will prepare you to prove your data science skills by successfully taking for the CompTIA Data Plus exam. What you'll learn and how you can apply it By the end of this course, you will: Understand the importance of the CompTIA Data Plus exam and its objectives. Learn how to collect, analyze, and report on various types of commonly used data. Learn about how to transform raw data into usable information for your stakeholders. Learn about database types, data structures, data schemes and other important aspects of data management. Understand how JSON data, HTML data, and XML data is used with data professionals. Understand how ETL and ELT processes work, how APIs connect us to the cloud and learn about profiling datasets. Learn about data manipulation techniques and important concepts around data transposition and normalization. Learn about descriptive statistics, inferential statistics, and various analytic techniques. Identify common analytics tools used in data analysis. Learn about the importance of Structured Query Language (SQL) and its main components. This course is for you because... You're a current or aspiring Data Engineer, Data Analyst, Data Architect, Database Manager or others IT professional interested in managing data. Prerequisites To get the most of this course it is recommended to have the following experience and/or resources: Basic hands-on SQL Database experience around relational database A computer with any version of Excel installed (if you don't already have it, you can sign up for a free 30-day trial).
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886649 , 1835886647
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Computer science Mathematics ; Apprentissage automatique ; Informatique ; Mathématiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course starts with an introduction to the key concepts and outlines the roadmap to success in the field. You'll begin by understanding the foundational elements of matrix and vector derivatives, exploring topics like linear and quadratic forms, chain rules in matrix form, and the derivative of determinants. Each concept is reinforced with exercises, ranging from quadratic challenges to least squares and Gaussian methods. The course progresses into optimization techniques essential in data science and machine learning. Delve into multi-dimensional second derivative tests, gradient descent in one and multiple dimensions, and Newton's method, including practical exercises in Newton's Method for least squares. An additional focus is set on setting up your environment, where you'll learn to establish an Anaconda environment and install crucial tools like Numpy, Scipy, and TensorFlow. The course also addresses effective learning strategies, answering pivotal questions like the suitability of YouTube for learning calculus and the recommended order for taking courses in this field. As you journey through the course, you'll transition from foundational concepts to advanced applications, equipping yourself with the skills needed to excel in data science and machine learning. What you will learn Understand matrix and vector derivatives Master linear and quadratic forms Apply the chain rule in matrix calculus Solve optimization problems using gradient descent and Newton's method Set up the Anaconda environment for machine learning Install and use key libraries like Numpy and TensorFlow Develop effective strategies for learning calculus in data science Audience This course suits students and professionals eager to learn the math behind AI, Data Science, and Machine Learning, ideal for deepening knowledge in these advanced technology fields. Learners should have a basic knowledge of linear algebra, calculus, and Python programming to effectively understand matrix calculus. A keen interest and enthusiasm for exploring this intricate subject are also crucial for a fulfilling learning experience. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/85
    Keywords: SQL (Computer program language) ; SQL (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. Build web services to serve data with Python standard library Analyze and process extracts with Linux utilities Chain MySQL, Python, and Linux together for quick data tasks Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138358051 , 0138358052
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.43/2
    Keywords: Linux ; Operating systems (Computers) ; Computer networks ; Systèmes d'exploitation (Ordinateurs) ; Réseaux d'ordinateurs ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135313022 , 0135313023
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Kubernetes ; Application software Development ; Computer programs ; Logiciels d'application ; Développement ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Artificial intelligence ; Architecture logicielle ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Over the past year, generative AI has dominated headlines. We know that it's being used to write code, but how can you leverage its power in software architecture when every company's architecture is different? How can you convert the knowledge automated by AI into the wisdom required for software architecture? What are the best ways to use this powerful tool to improve your architecture's security and resiliency? Join us to discover how AI may impact software architecture and how you can use it in your architectural processes right now. You'll explore AI for SaaS architecture, how to use AI to create diagrams, and more. If you're looking to stay one step ahead, these sessions are for you. What you'll learn and how you can apply it Understand the possibilities and risks of AI so you can judge when and how to use it Learn how GenAI mechanisms can influence core SaaS architecture strategies and how you can implement this in your SaaS solution Explore the use of prompt engineering for architectural tasks and leverage generative AI to improve their work This live event is for you because... You want to understand how to use generative AI to improve and communicate your software architecture. You're a senior-level developer who wants to make the move to architect. You're a practicing software architect who wants to hone your skills and learn new software architecture techniques and practices. Recommended follow-up: Read Building Multi-Tenant SaaS Architectures (book) Read Communication Patterns (book) Read Software Architecture: The Hard Parts (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Architecture logicielle ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Interactive Technical Projects A weekly updated series of tutorials on interactive technical projects Learning Objectives Learn practical skills by building real-world projects with cutting-edge technologies Learning to build full stack solutions with languages like Rust, Python, LLMs and Data Science Learning the key tools and techniques used by industry experts to create robust applications Get hands-on practice applying your core technical knowledge Understand how all the pieces fit together by building projects end-to-end Troubleshoot bugs and solve complex problems that appear in production systems Expand your portfolio and r©♭sum©♭ with impressive projects Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Database management ; Big data ; Architecture logicielle ; Bases de données ; Gestion ; Données volumineuses ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join Neal Ford and Zhamak Dehghani for a discussion about the challenges of creating, sharing, and finding data and making your data work for you. With the rise of generative AI, companies need to manage large quantities of data and are looking at distributed data systems and data mesh to solve this challenge. The problem consists in getting from their existing data storage to a distributed data system that works for all stakeholders. As the originator of the concept of data mesh, and because of her ongoing work with scaling decentralized data, Zhamak is well positioned to provide updates and advice on this more holistic approach to data management. What's New in Software Architecture gives you a chance to explore trending topics in software architecture and to ask Neal and Zhamak Dehghani anything you want about data mesh, how to begin making the move to decentralized data, and their own career journeys. We will spend a few minutes covering the trends that are influencing software architecture and then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it Understand what a data mesh is and how it differs from other methods of storing and sharing data Learn the key data characteristics you need to be a data-led organization Explore the tools that can help you make the move to data mesh This live course is for you because... You want to hear from Neal Ford and Zhamak Dehghani about software architecture and data mesh. Recommended Follow-Up: Read Building an Event-Driven Data Mesh (book) Read Data Mesh (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/03802855745
    Keywords: Data warehousing ; Big data ; Entrepôts de données (Informatique) ; Données volumineuses ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sponsored by Dremio Storing, processing, and moving data efficiently and cost-effectively in the cloud is a must for working with today's enormous datasets. These expert-led sessions deliver insight into how to increase the scalability, speed, and availability of your data and equip you with a set of best practices for utilizing your data warehouse, data lake, or data lakehouse. What you'll learn and how you can apply it Get an overview of the latest technologies for storing and managing your data Learn best practices for standardizing lakehouse data modeling and pipelining Find out how to streamline data lake implementation Explore how to securely develop and implement ML models on a cloud data warehouse Discover the benefits of data contracts in the modern data stack Understand how to enhance lakehouse infrastructure for multimodal AI This Superstream recording is for you because... You're a data or software engineer or solution architect who's interested in learning about the latest trends in storing, processing, and managing data. You want to improve the scalability, speed, and availability of your data. You want to better understand the systems that you already use and learn how to take full advantage of their capabilities. Recommended follow-up: Read Deciphering Data Architectures (early release book) Read Practical Lakehouse Architecture (early release book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138293321 , 0138293325
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Become a Linux power user! Overview: Learn the ins and outs of Linux Internals and discover what makes Linux the most powerful operating system Get under the hood and understand how Linux really works Perform in-depth practical investigations of key Linux functionalities Linux Under the Hood offers an extensive exploration of how Linux functions, allowing you to fully harness its capabilities. Familiarizing yourself with Linux internals will allow you to surpass mere commands and gain valuable insights to optimize your use of Linux. The first module dives into a deeper understanding of Linux architecture; you will learn about the inner workings of key Linux components like the kernel, systemd, and the Linux boot procedure. The following module will focus on storage and filesystems, encompassing local devices as well as cloud and datacenter storage solutions. Next, we will cover core components, including memory, processes, and the intricacies of command execution. Finally, we will explore Linux's evolution into a container-based platform. Each lesson concludes with a real-world scenario, where Sander demonstrates the practical implementation of various features explained in the lesson videos. Sign up for live training classes by Sander van Vugt: Linux Under the Hood (Updated) If you believe your knowledge of the Linux operating system is limited, you can start with Sander's Linux Fundamentals, 2 nd edition video course. About the Instructor: Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level: Intermediate to advanced Course requirement: Learners are expected to have basic working knowledge of the Linux operating system. Learners should prepare one virtual or physical machine with any Linux distribution; hardware specs are not important. To make it easy to follow along with the instructor, it is recommended (but not required) to install either the latest version of Ubuntu LTS (either workstation or server edition) or the latest CentOS Stream or equivalent. Who Should Take This Course: The target audience for this course consists of people that have used Linux for a while and who want to know what it really is doing. The typical primary audience consists of system administrators. The secondary audience consists of operating system students and others who want to know how Linux works. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887080 , 1835887082
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/4
    Keywords: Computer software Testing ; Automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing and comparing Cypress with Selenium, emphasizing Cypress's architectural advantages in automation. It guides you through tool installation across various operating systems and dives into Cypress's setup, test runner, and structure, laying a solid foundation for your journey in automation. Beyond setup, the course dives into Cypress automation, covering syntax, locator strategies, selector playground, CSS selectors, and XPath use. It enhances your grasp of Cypress commands, including chaining and handling child elements, and contrasts Cypress's asynchronous nature with synchronous operations, guiding you in promise handling. You'll explore Cypress assertions, including implicit, explicit, and common types used in testing. The course emphasizes interactive web UI elements, teaching interaction techniques with checkboxes, dropdowns, and mouseover events, and covers element list handling with loops and iterations. Additionally, learn to navigate through windows, tabs, popups, and frames, and address common challenges while building a strong framework. The course thoroughly covers the POM, environment variables, and experimental features. It also delves into API testing and automation, along with practical sessions on Git, GitHub, Jenkins, and advanced CSS selectors. What you will learn Understand Cypress architecture and how it compares with Selenium Understand the asynchronous nature of Cypress and handle promises Conduct both implicit and explicit assertions in testing Interact with web UI elements like checkboxes, dropdowns, and mouseover events Perform API automation with Cypress Integrate and manage Jenkins for continuous integration Audience Ideal for a wide range in software testing, this course benefits QA professionals and manual testers transitioning to automation, enhances skills, aids fresh graduates in software engineering, and offers QA Team leads and Managers insights into automation tools and best practices. Perfect for all levels in the QA and testing field. No prior automation or coding experience required; course suitable for beginners with JavaScript concepts included. Requires only a Windows/MAC computer and a browser (Firefox or Chrome). About the Author Let's Kode It : Let's Kode It is here with a mission to teach everyone a new skill--doing what they have always wanted to do. They are a group of software professionals with more than 10 years of expertise in different areas of software industries and working as team leads in multinational companies. All their instructors have master's degrees from reputed universities. Their expertise lies in various fields of Software Development Life Cycle (SDLC)--from application development and testing to system administration. Be it programming or creating a professional-looking MS Word document, they believe anyone can code and that coding is not something out of this world. Their goal is to offer high-quality technology courses, which will suit a newbie as well as an intermediate.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/09
    Keywords: Goal (Psychology) ; Motivation (Psychology) ; Motivation (Psychologie) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Performance reviews often produce a rollercoaster of emotions, reduced productivity, and increased workload and frustration for employees, managers, and HR business partners. This is because most new managers are not provided with training on how to work with their reports to identify, set, and track S.M.A.R.T. goals. Without realistic, achievable goals, filling out the requested review documents is painstaking and laborious. By the end of this course, the learner will have core goal setting skills that are brand agnostic so they can be utilized across organizations and business units. They will learn how to empower their team to define and write their own S.M.A.R.T. goals, all while ensuring full accountability. What you'll learn and how you can apply it Qualifying coaching questions to understand direct reports motivations and BHAGs Process to empower your team to define and write their S.M.A.R.T. goals Simple planning methodology Goal tracking recommendations 360 accountability (holding yourself and your direct reports accountable to achieve their goals) This course is for you because: You're a newly promoted manager looking for a process that helps facilitate goal setting and structured accountability for your team. You're a new people manager who is entering your first round of performance reviews. While you understand the company mandated deliverables, you are unsure how to structure conversations with your direct reports to complete them. You're a fairly new manager. While you have been through cycles before, your team is preparing for the next performance review cycle and you need to simplify the process. Prerequisites: Beginner knowledge of S.M.A.R.T. goals.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Microsoft Azure (Computing platform) ; Cloud computing Study guides Examination ; Microsoft Azure (Plateforme informatique) ; Infonuagique ; Examen ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Many organizations are moving some or all of their on-premises network resources to the cloud, and for Microsoft shops, that often means Microsoft Azure. IT professionals who are grounded in on-premises networking need to develop their cloud management skills and prove those skills to their employers. This training explains the Microsoft Certified Azure Administrator certification; outlines the key topics of storage, identity, security, and governance; walks through demos of the activities that candidates will be expected to understand; previews what to expect in the exam; and offers tried-and-true study tips honed through years of taking and writing Microsoft courses. What you'll learn and how you can apply it In combination with the course Azure Administrator Associate (AZ-104) - Managing Compute and Networking Resources, you'll learn the fundamentals needed to pass the AZ-104 Microsoft certification course Understand the different types of Azure identities and how to administer Azure resources using the hierarchy of available structures Understand how to create, secure, and monitor storage as well as how to ensure adequate storage fault tolerance and availability Understand the various tools available for monitoring Azure resources, including analytical and logging tools This course is for you because... You are (or hope to be) an IT administrator in an organization moving to Azure. You work with virtual machines and cloud services in a Microsoft shop. You wish to become a certified Azure Administrator Associate (MC:AAA) via the Microsoft AZ-104 exam. You're a developer who wishes to understand the basic administrative context of the environment for your Azure-based apps. Prerequisites: Basic familiarity with Windows and Windows networking Basic familiarity with virtualization Basic familiarity with PowerShell.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886502 , 1835886507
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 25 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Risk management ; Sécurité informatique ; Gestion du risque ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Power BI (Computer file) ; Business intelligence Computer programs ; Information visualization Computer programs ; Business Data processing ; Visualisation de l'information ; Logiciels ; Gestion ; Informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Learning Power BI is crucial for anyone who wants to enter the field of data analytics or advance their career in it. With the exponential growth of data in every industry, the ability to collect, analyze, and present data in a clear and concise manner is becoming more and more valuable. In this course, attendees will learn how to work with Power BI in real-life scenarios, discover the most frequently used functionalities of the tool, and gain insight into the most efficient techniques used by professionals in the field. This course is highly recommend this course to those who are pursuing a career in data analytics within their own organizations or as consultants.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038011
    Keywords: Management information systems ; Business Data processing ; Big data ; Systèmes d'information de gestion ; Gestion ; Informatique ; Données volumineuses ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: An increasing number of organizations are adopting data mesh due to its ability to explain and address the frustrations that many organizations experience as they try to get value from data at scale. Data mesh treats data as a product, considers domains as a primary concern, applies platform thinking to create self-serve data infrastructure, and introduces a federated computational model of data governance. This course will show you how to holistically combine the changes to the technical landscape and the operational model required for data mesh to succeed. You will explore domain ownership, data as a product, how to create a strong developer experience, and federated governance. Once you have completed the course, you will be able to understand the different elements of data mesh in practice and have the confidence to drive data mesh adoption in your company. What you'll learn and how you can apply it: Understand the intent and value behind the foundational elements of data mesh, and have the confidence to participate in a data mesh adoption. This course is for you because: You are or are interested in becoming, involved in a data mesh adoption. You have a stake in successful data use at scale-you're a machine learning practitioner, a data engineer, an engineering manager with responsibility for data or a leader of a technical organization. You are interested in problems at the intersection of business, data and collaboration. Prerequisites Either: Practical experience implementing distributed transactional systems. Practical experience implementing analytical systems. Recommended follow-up: Read Designing Data-Intensive Applications to deepen your technical understanding of data systems at scale. Read Creating a Data-Driven Organisation for a broader look at how to structure an organization to maximize value from data. Read Fundamentals of Data Observability to learn about how to automate data quality checks. Read Enterprise Data Catalog for a deep dive into the discovery part of data management.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880760 , 1835880762
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.15/5
    Keywords: Risk management ; Information technology Security measures ; Gestion du risque ; Technologie de l'information ; Sécurité ; Mesures ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The NIST 800-37 Risk Management Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology to assist organizations in managing and mitigating information security risks effectively. It provides a structured approach to risk management, emphasizing continuous monitoring and a lifecycle process for securing information systems. The NIST 800-37 Risk Management Framework (RMF) guides organizations through a systematic risk management process. It begins with "Prepare" to establish context and allocate resources, followed by "Categorize" for classifying information systems. The subsequent steps include "Select Controls" to tailor security measures, "Implement Controls" to put them into practice, "Assess Controls" for effectiveness evaluation, "Authorize" for system approvals, and "Monitor" for continuous oversight and response to changes in the information system's environment. Upon completion, you will possess a clear understanding of the framework principles and components. Armed with this knowledge, navigate the risk management lifecycle with confidence. You will gain proficiency in identifying, assessing, and prioritizing risks, selecting and implementing security controls, and ensuring continuous monitoring and authorization aligned with industry best practices. What you will learn Understand core principles and significance of NIST 800-37 RMF Learn methodologies for risk identification and prioritization Choose and implement controls based on organizational risk Assess implemented controls and identify vulnerabilities Grasp the steps to grant system and information authorizations Integrate NIST 800-37 RMF with other compliance frameworks and standards Audience The course is tailored for cybersecurity professionals, including risk managers, information security officers, compliance officers, IT and security managers, and risk assessment professionals. Geared toward individuals with a foundational knowledge of cybersecurity, the course equips you with skills to navigate the risk management lifecycle. You will gain proficiency in risk identification, assessment, and prioritization, and implementation of security controls. The course addresses RMF integration with compliance frameworks for those overseeing regulatory compliance within organizations. About the Author Alexander Oni: Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    ISBN: 9781835883549 , 1835883540
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This in-depth masterclass provides end-to-end coverage of developing enterprise-grade LLMs tailored to your unique use cases. Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. You'll learn how to make crucial architecture decisions, select optimal model types, configure hyperparameters, and curate quality training data. Discover professional techniques for pre-training, iterative fine-tuning, and rigorous model evaluation. The instructors reveal insider strategies to productionize your LLMs smoothly, monitor them proactively, and maintain optimal performance post-deployment. Following a structured curriculum spanning the complete LLM lifecycle, this masterclass empowers you with hands-on skills to build, refine, and deploy large language models with confidence. Turbocharge your generative AI initiatives and get the practical knowledge needed to create LLMs that solve complex challenges for your organization. What you will learn How to select the right LLM architecture for your use case Approaches for sourcing, cleaning, and labeling quality training data Pre-training methods and hyperparameter optimization Advanced fine-tuning techniques to boost performance Ways to thoroughly evaluate LLMs before deployment Best practices for monitoring, updating, and maintaining production LLMs Audience Data scientists, machine learning engineers, and AI developers seeking an in-depth understanding of large language model (LLM) development. This masterclass is designed for professionals aiming to build, optimize, and deploy enterprise-grade LLMs tailored to specific use cases, with a focus on practical skills and real business impact. About the Authors Maxime Labonne: Sr. Machine Learning Scientist, JPMorgan. Denis Rothman: Expert in AI Transformers including ChatGPT/GPT-4, Bestselling Author. Abi Aryan: ML Engineer and Author.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138303921 , 0138303924
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "4+ Hours of Video Instruction Leverage the power of Agile estimating and planning to manage client and stakeholder expectations throughout every stage of software development. Overview The inevitable questions while navigating a software development project with a customer are ""When will it be done?"" and ""How much will it cost?"" In this video, Agile expert Tommy Norman shows you how to manage these client and stakeholder expectations using Agile estimating and planning. You will learn how to move beyond the limitations of the time-money-scope iron triangle and address your customer's concerns by understanding their overarching business goals. You will learn how to scope and estimate for a software project with minimal information, as well as how to use product visioning, personas/goals, and story mapping to ensure everyone understands the why, who, and what of the product they are building. You will explore strategies to maximize the Product Backlog's value and how to continually integrate new insights. You will discover how the Product Backlog influences the Release Plan and how it can surface early indicators that reveal the need for potential adjustments to scope and schedule. Finally, you will learn to assess the impact of deliverables on business outcomes and how to incorporate these lessons back into the Product Backlog. About the Instructor Tommy Norman (CSM, A-CSM, CSPO, CSP, CTC, CEC, CAL, PSM, SAFe Agilist, Microsoft MVP) has had an IT career spanning over 30 years, he has been helping organizations of all sizes and shapes build great software with a practical approach in a multitude of roles. He has worked deeply with the Agile community as the coordinator of the Agile Nashville user group, is founder of the Music City Agile conference, a popular contributor to Pearson's Live Online Training Program and Video Courses available on the O'Reilly Learning platform, and a frequent local and international speaker. Learn How To Align with stakeholders' business goals using product visioning activities. Give enough upfront forecasting to make sound budgeting decisions using a simple estimation process. Use personas and story mapping to focus on end-user value delivered. Apply empirical data to a simple and highly reliable release plan approach to help customers maximize value and learning. Use operational style review points to get ahead of any issues and keep the team and stakeholders in constant alignment. Who Should Take This Course Individuals seeking outcomes in Agile software development, aiming to maximize product value. Those tasked with forecasting the cost and duration of an upcoming software development effort who want to do so with an Agile approach. Individuals tracking the progress of an Agile software development effort who need practical methods to set expectations with teams and stakeholders. Course Requirements You should have a basic understanding of Agile software development using a framework such as Scrum or Kanban. Lesson descriptions Lesson 1: This lesson explores the underlying needs behind the questions "When?" and "How Much?" and the best way to meet these needs. It covers how to manage expectations and the importance of a successful beginning to any software development effort. Lesson 2: This lesson covers how to set initial expectations with subsequent efforts in mind. It discusses how to identify the true business value of a software development project, how to estimate time and cost with enough accuracy to support solid decision making, and how to assess the feasibility of a software development effort. Lesson 3: This lesson covers getting a software development effort started. It focuses on the "why" and "how" of solving end users' problems and demonstrates populating the initial product backlog. Lesson 4: This lesson covers how to approach estimating for a software development effort. It explores the benefits of focusing more on conversations and less on estimates to best develop a sense of time and scope for a project. Lesson 5: This lesson covers the art of release planning. Using the product backlog and estimates worked out in the previous lessons, it demonstrates how to create a release plan that makes time, money, and value obvious to your stakeholders and your team. Lesson 6: This lesson covers how to leverage empirical data for an agile approach to release planning. It discusses the importance of good metrics, and how such metrics can inform modifications to the release plan and allow us to adjust expectations appropriately. Lesson 7: This lesson underscores that estimating and planning is all about expectation management. It shows how to use tools and techniques taught in preceding lessons to create short feedback loops. Tommy shares his favorite ways of reviewing progress and new information, and illustrating how the team's efforts are helping stakeholders achieve the right outcomes. Lesson 8: This lesson covers how to successfully implement agile estimating and planning using applicable real-world examples and discusses how to scale these principles and practices. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.".
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135319673 , 0135319676
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Computer security Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Master AWS Security with our AWS Certified Security Specialty Exam Prep Course! Review all objectives and learn what's new in the AWS SCS-C02 exam. Explore the principles and uses of AWS's key security services. Experience real-world practice questions so you can develop skills to eliminate incorrect answers and tackle exam scenarios with precision. Are you ready to excel on the AWS Certified Security Specialty (SCS-C02) exam? Explore the latest knowledge areas, services, domains, and features of the exam in this comprehensive video course. Designed for success, this course ensures you understand key concepts and strategies critical for achieving certification. Best-selling author and trainer Chad Smith will also help you gain insights into the AWS Certified Security Specialty exam and teach best practices for exam day confidence. Related Learning Sign up for AWS Certified Security - Specialty (SCS-C02) Crash Course by Chad Smith About the Instructor Chad Smith is a technology professional, author, and trainer focused on cloud infrastructure and management. He is the Principal Cloud Architect at Brightkey.cloud and has a wealth of personal real-world experience in cloud adoption, infrastructure design, operations, and security. Chad holds current AWS certifications in Architecture, SysOps, Security, Networking and Databases, and is also certified in CompTIA Cloud+. You can follow Chad here: Twitter: brightkey_cloud LinkedIn: https://www.linkedin.com/in/chadsmith1973/ Professional Blog: https://www.brightkey.cloud Email: chad@brightkeycloud.com Skill Level Intermediate Course requirement None.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886281 , 1835886280
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Scrum (Computer software development) ; Agile software development ; Continuous improvement process ; Scrum (Développement de logiciels) ; Méthodes agiles (Développement de logiciels) ; Amélioration continue ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a comprehensive journey into Scrum and Agile project management in our course. Starting with foundational principles, we move on to advanced concepts, guiding you through effective project management with Scrum. Furthermore, gain insights into orchestrating Scrum Teams, exploring the nuances of running projects with Scrum, and understanding key Scrum concepts. Moving on, you will immerse yourself in the dynamic flow of Scrum Events and equip your toolkit with essential platforms using our Scrum Toolkit series. Next up, explore popular tools such as Jira, Microsoft Teams, Microsoft Planner, and the newly introduced Trello. Stay ahead with the latest trends by incorporating ChatGPT into Scrum Teams for optimization and productivity, a cutting-edge dimension unveiled in our course. As you progress through the course, witness Scrum in practice, honing your skills through practical applications. With high-quality video lectures, downloadable handouts for quick reference, and engaging quizzes, this course provides a dynamic and interactive educational experience. By the end of the course, you will have a solid grasp of Scrum and Agile project management. You will be well-versed in the Scrum culture, proficient in managing projects using Scrum methodologies, and skilled in running projects with Scrum Teams. What you will learn Learn to apply Scrum for project success Explore how to deliver business value through Scrum Accelerate project delivery by understanding Scrum Master diverse Scrum concepts for effective implementation Explore proficiency in utilizing Scrum tools Understand the depth of Scrum values, principles, and pillars Audience This course is tailored for diverse audiences, including beginners exploring Scrum and those seeking certification. Ideal for project managers, developers, business analysts, architects, designers, and managers, it covers foundational to advanced Scrum concepts. Whether you are starting your Scrum journey or aiming to enhance existing skills, this course provides valuable, concise, and flexible learning experiences for successful Scrum adoption in various professional roles. About the Author YESI EDUCATION: Mauricio Rubio Parra is an Agile Guru and the founder of YESI EDUCATION. In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. YESI EDUCATION is a global online education business with over 100 products that reach more than half a million students in over 200 countries. Their portfolio of products includes online courses, eBooks, audiobooks, newsletters, apps, podcasts, and other educational resources such as templates. YESI is formally incorporated and headquartered in Sydney, Australia, and has three main divisions: education, property and invest. YESI, founded in 2016, has a strong focus on passive income generation and wealth creation. The company constantly explores new revenue streams, disruptive and innovative technologies as well as investment opportunities and new products within its three divisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Logiciels d'application ; Développement ; Automatisation ; automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In DevOps, SRE, and operations, toil is the enemy. Fortunately, the repetitive and time-consuming manual work that drains team resources is steadily being automated. As a result, the automation tooling landscape has expanded to encompass a wide range of tasks. Whether it's testing, infrastructure configuration and management, provisioning, monitoring, or observability, there's now a tool to automate it. Evaluating and choosing among these tools is critical to the success of DevOps and SRE. Join us for in-depth sessions with leading experts to explore what it means to automate, what successful automation looks like, and how to assess the available tools and determine the right ones for your needs. What you'll learn and how you can apply it Understand how to tame your infrastructure as code using architectural patterns for infrastructure as code architecture Learn the basics of working with Terraform in production environments Explore the integration of Crossplane and Kyverno to automate cluster creation, resource configuration, compliance enforcement, add-on deployment, and security checks This live course is for you because... You're a DevOps engineer or SRE for whom understanding and implementing automation is part of the job. You're a platform engineer tasked with evaluating and implementing an automation toolchain that drives developer efficiency by reducing toil. You're a sysadmin or an operations engineer who wants to learn a more efficient, nonmanual way to build, control, and modify your infrastructure. Recommended follow-up: Read Infrastructure as Code, second edition (book) Read Terraform: Up and Running, third edition (book) Read Infrastructure as Code: Patterns and Practices (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138230029 , 0138230021
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 2+ Hours of Video Instruction Learn the top 20 professional and technical skills for being an effective project manager, as well as how to apply them practically and successfully, even if it is your first time managing a project. Overview: The Effective Project Management Skills video course covers the essential and practical skills you need to be an exceptional and well-rounded project manager. Throughout the course, Megan Andrew takes you through the top 20 skills that will enable you to effectively manage any project, even if it is your first time. By the end of the training, you will develop a comprehensive foundational skill set to effectively manage any project. Through a mix of exercises and real-world case studies, Megan Andrew unpacks each skill with practical steps to implement and enhance it. You will also run through a mix of exercises and real-world case studies to further cement these skills. These skills include selecting the project management approach and methodology; successfully managing, leading, and inspiring teams; prioritizing, scheduling, and negotiating tasks and resources; the management of budgets, costs, and risks; and enhanced communication, teamwork, problem, and decision-making. After each lesson, Megan walks you through real-world case studies designed to enhance your skills as well as help you learn how to practically apply them. Additional Resources: Sign up for Project and Product Management live training classes by Megan Andrew: https://learning.oreilly.com/search/?q=megan%20andrew&type=live-event-series Topics Covered Include: Understanding Project Management introduces you to project management and gives you an overview of what project management actually is and where the role of a project manager starts and ends. Project Management Approaches dives into various project management approaches and methodologies as well as how to choose which best suits you, your team, your organization, your project, etc., and how to apply it. Getting the Project Going touches on how to set the stage for a successful project, along with the key skills of being flexible and adaptable within the ever-changing world of project management, and how to develop the appropriate level of technical understanding. Managing and Working with People covers skills that help you manage and work with people. These skills include how to be a successful leader, what relationship and interpersonal skills entail and how to develop them, the importance of self-awareness, and how to communicate in a collaborative manner. Sticking to Timelines emphasizes the importance of sticking to your timelines with organization and prioritization, effective scheduling and task management, and how to ensure that documentation is done in a way that aligns with your selected project management approach and methodology. Getting Things Done takes a look at how important negotiation and influencing skills are in the project management space and how to develop them. You get a look at how to approach your project in a hands-on way, and how this can improve the success of your project. Managing Resources focuses on the foundational skills for managing the project's budget and costs, its associated risks, both positive and negative, and the quality of the project outputs. About the Instructor Megan Andrew is a highly skilled Senior Product Manager and Business Strategist, holding two degrees in science and a postgraduate degree in Business Administration. She is experienced in project management, relationship and stakeholder management, strategy creation and implementation, platform and sales optimization, and profit maximization. Megan has quickly excelled in roles across a diverse range of environments, ranging from large corporates to small start-ups to non-profits, and from banking, fintech, insurtech, and edtech to wellness and environmental sustainability. She is currently based in London but has spent the last four years in the vibrant city of Shanghai to extend her global reach, as well as to learn from the rapidly changing Chinese market. Her exceptional career is only matched by her deep love for animals and the environment, which she serves through her role with an NGO in Africa. Her spare time is spent traveling and exploring new parts of the world. Skill Level: Beginner-Intermediate Learn How To: Understand and practically apply the key skills necessary for effective project management at every stage of the project management process Identify, leverage, and enhance your natural skills and abilities for successful project management Kick-off and manage projects with engaged stakeholders, clear goals, and aligned teams Lead teams and projects, and generate buy-in... even if you're not a manager Who Should Take This Course: Project management isn't just for project managers--almost everyone plans and runs a project at some point. This course is tailored to anyone who is looking to develop or enhance their skills at effectively and successfully managing any project: Project Managers Anyone who finds themselves managing a project Anyone who is looking to upskill their project management skills About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Place of publication not identified] : Ascent Audio
    ISBN: 9781663734150 , 1663734151
    Language: English
    Pages: 1 online resource (1 sound file (6 hr., 18 min.))
    Edition: [First edition].
    DDC: 658.3008
    Keywords: Diversity in the workplace ; Corporate culture ; Multiculturalisme en milieu de travail ; Instructional films ; Nonfiction films ; Internet videos ; Audiobooks ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Livres audio
    Abstract: When Nellie Borrero joined Accenture, bigotry and bias went unnoticed and unchecked; it was simply the workplace norm. Now, thirty-five-plus years later, this first-generation Latina shares how she led diversity strategy and developed award-winning inclusion and diversity programs that transformed Accenture into the #1 ranked employer for inclusion, diversity, and equity. In Unwavering, Borrero draws on her experiences with remarkable candor and courage to inspire you to think bigger, know your value, and show up with it everywhere, every day. She reveals how to remove barriers and claim space not just for yourself but for others as well. You'll become aware of biases that negatively impact professionals of color; recognizing that belonging and uniqueness don't have to be at odds; standing up and standing out: taking your career from the margins to center stage; what to do when mentoring fails-and the power of embracing and accepting help; staying true to yourself when your values collide with reality; and showing up strategically, intentionally asserting yourself, and competing. A manifesto for understanding and action, Unwavering provides a proven framework for how to create transformational relationships that make diversity and inclusion an integral part of your success and your company's competitive advantage.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...