Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (1,477)
  • Turkish
  • 2020-2024  (1,477)
  • 1975-1979
  • Internet videos  (1,477)
Datasource
Material
Language
Years
Year
Keywords
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Audiobooks ; Livres audio
    Abstract: This is the one stop shop for all What's New in Software Development interviews of 2024 in their audio format. Keep up-to-date with Sam Newman and his colleagues on their software development journeys.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Microsoft Azure (Computing platform) ; Cloud computing Study guides Examination ; Microsoft Azure (Plateforme informatique) ; Infonuagique ; Examen ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Many organizations are moving some or all of their on-premises network resources to the cloud, and for Microsoft shops, that often means Microsoft Azure. IT professionals who are grounded in on-premises networking need to develop their cloud management skills and prove those skills to their employers. This training explains the Microsoft Certified Azure Administrator certification; outlines the key topics of storage, identity, security, and governance; walks through demos of the activities that candidates will be expected to understand; previews what to expect in the exam; and offers tried-and-true study tips honed through years of taking and writing Microsoft courses. What you'll learn and how you can apply it In combination with the course Azure Administrator Associate (AZ-104) - Managing Compute and Networking Resources, you'll learn the fundamentals needed to pass the AZ-104 Microsoft certification course Understand the different types of Azure identities and how to administer Azure resources using the hierarchy of available structures Understand how to create, secure, and monitor storage as well as how to ensure adequate storage fault tolerance and availability Understand the various tools available for monitoring Azure resources, including analytical and logging tools This course is for you because... You are (or hope to be) an IT administrator in an organization moving to Azure. You work with virtual machines and cloud services in a Microsoft shop. You wish to become a certified Azure Administrator Associate (MC:AAA) via the Microsoft AZ-104 exam. You're a developer who wishes to understand the basic administrative context of the environment for your Azure-based apps. Prerequisites: Basic familiarity with Windows and Windows networking Basic familiarity with virtualization Basic familiarity with PowerShell.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886281 , 1835886280
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Scrum (Computer software development) ; Agile software development ; Continuous improvement process ; Scrum (Développement de logiciels) ; Méthodes agiles (Développement de logiciels) ; Amélioration continue ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a comprehensive journey into Scrum and Agile project management in our course. Starting with foundational principles, we move on to advanced concepts, guiding you through effective project management with Scrum. Furthermore, gain insights into orchestrating Scrum Teams, exploring the nuances of running projects with Scrum, and understanding key Scrum concepts. Moving on, you will immerse yourself in the dynamic flow of Scrum Events and equip your toolkit with essential platforms using our Scrum Toolkit series. Next up, explore popular tools such as Jira, Microsoft Teams, Microsoft Planner, and the newly introduced Trello. Stay ahead with the latest trends by incorporating ChatGPT into Scrum Teams for optimization and productivity, a cutting-edge dimension unveiled in our course. As you progress through the course, witness Scrum in practice, honing your skills through practical applications. With high-quality video lectures, downloadable handouts for quick reference, and engaging quizzes, this course provides a dynamic and interactive educational experience. By the end of the course, you will have a solid grasp of Scrum and Agile project management. You will be well-versed in the Scrum culture, proficient in managing projects using Scrum methodologies, and skilled in running projects with Scrum Teams. What you will learn Learn to apply Scrum for project success Explore how to deliver business value through Scrum Accelerate project delivery by understanding Scrum Master diverse Scrum concepts for effective implementation Explore proficiency in utilizing Scrum tools Understand the depth of Scrum values, principles, and pillars Audience This course is tailored for diverse audiences, including beginners exploring Scrum and those seeking certification. Ideal for project managers, developers, business analysts, architects, designers, and managers, it covers foundational to advanced Scrum concepts. Whether you are starting your Scrum journey or aiming to enhance existing skills, this course provides valuable, concise, and flexible learning experiences for successful Scrum adoption in various professional roles. About the Author YESI EDUCATION: Mauricio Rubio Parra is an Agile Guru and the founder of YESI EDUCATION. In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. YESI EDUCATION is a global online education business with over 100 products that reach more than half a million students in over 200 countries. Their portfolio of products includes online courses, eBooks, audiobooks, newsletters, apps, podcasts, and other educational resources such as templates. YESI is formally incorporated and headquartered in Sydney, Australia, and has three main divisions: education, property and invest. YESI, founded in 2016, has a strong focus on passive income generation and wealth creation. The company constantly explores new revenue streams, disruptive and innovative technologies as well as investment opportunities and new products within its three divisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463444 , 1835463444
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Web site development Computer programs ; Application software Development ; Python (Computer program language) ; Sites Web ; Systèmes-auteur ; Logiciels d'application ; Développement ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Next.js is a popular open-source JavaScript framework designed to make web development with React efficient and scalable. Next.js adds layers of abstraction to React and simplifies the process of building modern web applications. It provides a set of conventions and features that enhance the development experience, making it easier to create performant and SEO-friendly applications. This comprehensive Next.js course unfolds by beginning with an introduction to web development fundamentals, as it progresses through React basics, advanced Next.js concepts, and real-world deployment strategies. We will explore key topics such as server-side rendering (SSR), client-side rendering (CSR), static site generation (SSG), and incremental static regeneration (ISR). The course offers hands-on experience with a final project, covering everything from structuring applications to optimizing for performance and SEO. The modular format accommodates varying skill levels, ensuring a well-rounded and practical learning experience for all learners. Upon completion of this Next.js course, you will become proficient in web development fundamentals, React essentials, and advanced Next.js concepts. Through hands-on experience, master server-side rendering, client-side rendering, dynamic routing, and performance and scalability in real-world scenarios. What you will learn Master SSR, CSR, and SSG for optimized web development Explore React basics and advanced component development in Next.js Implement Next.js best practices for efficient and scalable web applications Learn to create dynamic routes for versatile content handling Deploy fully functional applications using Vercel and Git/GitHub workflows Enhance applications for search engines and social platforms through metadata and SEO practices Audience This Next.js course is tailored for a diverse audience, catering to both entry-level and seasoned developers. Ideal for junior developers, it provides a strong foundation in web development fundamentals, React basics, and advanced Next.js concepts. Intermediate developers can enhance their skills and gain mastery in the latest features of Next.js. Senior web developers seeking to stay updated with modern concepts will find valuable insights for optimizing web applications. No programming experience is required, but basic web development and JavaScript understanding is desirable for the course. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881668 , 1835881661
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides a comprehensive exploration of Cisco Firewall and IPS systems, optimized for deployment within the AWS ecosystem. It commences with a foundational overview, catering to both novices and seasoned professionals. Beginning with AWS Virtual Private Cloud (VPC) configuration, you'll establish the foundation for building secure network infrastructures. The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. You'll master the Next-Generation Firewall virtual (NGFWv) deployment within AWS, bolstering your ability to safeguard networks against evolving cyber threats. Hands-on labs and practical exercises are integrated to impart real-world skills in configuring, troubleshooting, and securing Cisco Firewall and IPS systems. You'll gain expertise in risk management, report generation, and effective troubleshooting techniques. By course completion, you'll be well-prepared for Cisco CCNP Security SNCF (Exam 300-710), poised to excel in the realm of cybersecurity. What you will learn Configure AWS VPC for Cisco Firewall and IPS systems Deploy and manage FMCv and NGFWv in AWS Implement NGFW Routed and Transparent modes Explore multi-instance deployments and clustering Troubleshoot using CLI/GUI and perform packet capture Enhance security with Cisco AMP and other integrations Audience This course is ideal for cybersecurity professionals and network administrators looking to advance their skills in Cisco Firewall and IPS systems. A basic understanding of networking concepts and AWS is preferred. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883907 , 1835883907
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Artificial intelligence ; Apprentissage automatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is an innovative course tailored for those who aspire to master the dynamic fields of computer vision and generative artificial intelligence. This course offers a deep dive into the world of image recognition, object detection, and the magic of generative AI using tools like KerasCV, Python, TensorFlow, PyTorch, and JAX. This course guides you from the fundamentals of image classification to the intricacies of object detection, starting with the KerasCV library for deep learning. You'll learn to effectively use and fine-tune pre-trained models, create custom datasets for object detection, using tools like the LabelImg GUI program, and apply these skills to tackle real-world challenges. A key focus is the generative AI segment, particularly on Stable Diffusion, where you'll learn to generate detailed images from text, unlocking your creative potential in this advanced AI domain. This course offers a progressive learning path from basic concepts to advanced techniques, catering to both professional development and creative pursuits in AI. By the end, you'll have the confidence and tools needed for a variety of applications in the ever-evolving field of generative artificial intelligence. What you will learn Harness the power of the KerasCV library for efficient deep learning Master image classification techniques using pre-trained models Implement object detection in real-world scenarios Fine-tune models for tailored applications and datasets Create custom object detection datasets with LabelImg Understand the integration of TensorFlow, PyTorch, and JAX in computer vision Audience This course is ideal for individuals ranging from beginners to advanced learners who possess a fundamental understanding of machine learning and Python programming. It is especially beneficial for those keen on delving into the realm of computer vision using KerasCV. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/78
    Keywords: Cyberterrorism ; Cyberspace Security measures ; Risk management ; Cyberterrorisme ; Gestion du risque ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465578 , 1835465579
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: React (Electronic resource) ; Web site development ; Web applications Programming ; Sites Web ; Développement ; Applications Web ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the course, your gateway to mastering Recoil for React web development. Recoil, a powerful state management library by Facebook, revolutionizes app development with its simplicity and scalability. In this course, you will delve into Recoil's fundamentals, understanding why it's favored over Redux, and how it enhances React applications. Starting from scratch, you will learn to configure and use Recoil atoms and selectors, persist state data efficiently, and leverage advanced features like atom families. Embrace the transition from junior to senior developer by mastering Recoil's complexities, refining skills for scalable web and mobile applications, and acing declarative JavaScript solutions for interviews. Throughout the journey, you will build an app, progressing from the basics to advanced topics. Explore Recoil's nuances as we deep-dive into selector functionalities, state persistence mechanisms, and crafting performant logic for complex applications. By the end of this course, you will be equipped with a deep understanding of Recoil, confidently implementing scalable and high-performance state management in React applications. What you will learn Grasp Recoil's principles for popular state management Craft UI elements for better user interaction with Recoil Implement dynamic search filters with Recoil tools Persist data across sessions using recoil-persist Transition local to global state management through Recoil Build scalable state logic using advanced Recoil features Audience This course caters to a diverse audience, spanning junior to senior React developers eager to bolster their skill set. Beginners seeking a strong foundation in React and Recoil, intermediate developers aspiring to refine scalable code, and seasoned professionals keen on staying updated with modern industry requirements will all find immense value. Basic knowledge of JavaScript and React is recommended, but not mandatory, ensuring accessibility for learners at varying proficiency levels. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Database management ; Big data ; Architecture logicielle ; Bases de données ; Gestion ; Données volumineuses ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join Neal Ford and Zhamak Dehghani for a discussion about the challenges of creating, sharing, and finding data and making your data work for you. With the rise of generative AI, companies need to manage large quantities of data and are looking at distributed data systems and data mesh to solve this challenge. The problem consists in getting from their existing data storage to a distributed data system that works for all stakeholders. As the originator of the concept of data mesh, and because of her ongoing work with scaling decentralized data, Zhamak is well positioned to provide updates and advice on this more holistic approach to data management. What's New in Software Architecture gives you a chance to explore trending topics in software architecture and to ask Neal and Zhamak Dehghani anything you want about data mesh, how to begin making the move to decentralized data, and their own career journeys. We will spend a few minutes covering the trends that are influencing software architecture and then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it Understand what a data mesh is and how it differs from other methods of storing and sharing data Learn the key data characteristics you need to be a data-led organization Explore the tools that can help you make the move to data mesh This live course is for you because... You want to hear from Neal Ford and Zhamak Dehghani about software architecture and data mesh. Recommended Follow-Up: Read Building an Event-Driven Data Mesh (book) Read Data Mesh (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138358051 , 0138358052
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.43/2
    Keywords: Linux ; Operating systems (Computers) ; Computer networks ; Systèmes d'exploitation (Ordinateurs) ; Réseaux d'ordinateurs ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Ascent Audio
    ISBN: 9781663734150 , 1663734151
    Language: English
    Pages: 1 online resource (1 sound file (6 hr., 18 min.))
    Edition: [First edition].
    DDC: 658.3008
    Keywords: Diversity in the workplace ; Corporate culture ; Multiculturalisme en milieu de travail ; Instructional films ; Nonfiction films ; Internet videos ; Audiobooks ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Livres audio
    Abstract: When Nellie Borrero joined Accenture, bigotry and bias went unnoticed and unchecked; it was simply the workplace norm. Now, thirty-five-plus years later, this first-generation Latina shares how she led diversity strategy and developed award-winning inclusion and diversity programs that transformed Accenture into the #1 ranked employer for inclusion, diversity, and equity. In Unwavering, Borrero draws on her experiences with remarkable candor and courage to inspire you to think bigger, know your value, and show up with it everywhere, every day. She reveals how to remove barriers and claim space not just for yourself but for others as well. You'll become aware of biases that negatively impact professionals of color; recognizing that belonging and uniqueness don't have to be at odds; standing up and standing out: taking your career from the margins to center stage; what to do when mentoring fails-and the power of embracing and accepting help; staying true to yourself when your values collide with reality; and showing up strategically, intentionally asserting yourself, and competing. A manifesto for understanding and action, Unwavering provides a proven framework for how to create transformational relationships that make diversity and inclusion an integral part of your success and your company's competitive advantage.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887080 , 1835887082
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/4
    Keywords: Computer software Testing ; Automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing and comparing Cypress with Selenium, emphasizing Cypress's architectural advantages in automation. It guides you through tool installation across various operating systems and dives into Cypress's setup, test runner, and structure, laying a solid foundation for your journey in automation. Beyond setup, the course dives into Cypress automation, covering syntax, locator strategies, selector playground, CSS selectors, and XPath use. It enhances your grasp of Cypress commands, including chaining and handling child elements, and contrasts Cypress's asynchronous nature with synchronous operations, guiding you in promise handling. You'll explore Cypress assertions, including implicit, explicit, and common types used in testing. The course emphasizes interactive web UI elements, teaching interaction techniques with checkboxes, dropdowns, and mouseover events, and covers element list handling with loops and iterations. Additionally, learn to navigate through windows, tabs, popups, and frames, and address common challenges while building a strong framework. The course thoroughly covers the POM, environment variables, and experimental features. It also delves into API testing and automation, along with practical sessions on Git, GitHub, Jenkins, and advanced CSS selectors. What you will learn Understand Cypress architecture and how it compares with Selenium Understand the asynchronous nature of Cypress and handle promises Conduct both implicit and explicit assertions in testing Interact with web UI elements like checkboxes, dropdowns, and mouseover events Perform API automation with Cypress Integrate and manage Jenkins for continuous integration Audience Ideal for a wide range in software testing, this course benefits QA professionals and manual testers transitioning to automation, enhances skills, aids fresh graduates in software engineering, and offers QA Team leads and Managers insights into automation tools and best practices. Perfect for all levels in the QA and testing field. No prior automation or coding experience required; course suitable for beginners with JavaScript concepts included. Requires only a Windows/MAC computer and a browser (Firefox or Chrome). About the Author Let's Kode It : Let's Kode It is here with a mission to teach everyone a new skill--doing what they have always wanted to do. They are a group of software professionals with more than 10 years of expertise in different areas of software industries and working as team leads in multinational companies. All their instructors have master's degrees from reputed universities. Their expertise lies in various fields of Software Development Life Cycle (SDLC)--from application development and testing to system administration. Be it programming or creating a professional-looking MS Word document, they believe anyone can code and that coding is not something out of this world. Their goal is to offer high-quality technology courses, which will suit a newbie as well as an intermediate.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138230029 , 0138230021
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 2+ Hours of Video Instruction Learn the top 20 professional and technical skills for being an effective project manager, as well as how to apply them practically and successfully, even if it is your first time managing a project. Overview: The Effective Project Management Skills video course covers the essential and practical skills you need to be an exceptional and well-rounded project manager. Throughout the course, Megan Andrew takes you through the top 20 skills that will enable you to effectively manage any project, even if it is your first time. By the end of the training, you will develop a comprehensive foundational skill set to effectively manage any project. Through a mix of exercises and real-world case studies, Megan Andrew unpacks each skill with practical steps to implement and enhance it. You will also run through a mix of exercises and real-world case studies to further cement these skills. These skills include selecting the project management approach and methodology; successfully managing, leading, and inspiring teams; prioritizing, scheduling, and negotiating tasks and resources; the management of budgets, costs, and risks; and enhanced communication, teamwork, problem, and decision-making. After each lesson, Megan walks you through real-world case studies designed to enhance your skills as well as help you learn how to practically apply them. Additional Resources: Sign up for Project and Product Management live training classes by Megan Andrew: https://learning.oreilly.com/search/?q=megan%20andrew&type=live-event-series Topics Covered Include: Understanding Project Management introduces you to project management and gives you an overview of what project management actually is and where the role of a project manager starts and ends. Project Management Approaches dives into various project management approaches and methodologies as well as how to choose which best suits you, your team, your organization, your project, etc., and how to apply it. Getting the Project Going touches on how to set the stage for a successful project, along with the key skills of being flexible and adaptable within the ever-changing world of project management, and how to develop the appropriate level of technical understanding. Managing and Working with People covers skills that help you manage and work with people. These skills include how to be a successful leader, what relationship and interpersonal skills entail and how to develop them, the importance of self-awareness, and how to communicate in a collaborative manner. Sticking to Timelines emphasizes the importance of sticking to your timelines with organization and prioritization, effective scheduling and task management, and how to ensure that documentation is done in a way that aligns with your selected project management approach and methodology. Getting Things Done takes a look at how important negotiation and influencing skills are in the project management space and how to develop them. You get a look at how to approach your project in a hands-on way, and how this can improve the success of your project. Managing Resources focuses on the foundational skills for managing the project's budget and costs, its associated risks, both positive and negative, and the quality of the project outputs. About the Instructor Megan Andrew is a highly skilled Senior Product Manager and Business Strategist, holding two degrees in science and a postgraduate degree in Business Administration. She is experienced in project management, relationship and stakeholder management, strategy creation and implementation, platform and sales optimization, and profit maximization. Megan has quickly excelled in roles across a diverse range of environments, ranging from large corporates to small start-ups to non-profits, and from banking, fintech, insurtech, and edtech to wellness and environmental sustainability. She is currently based in London but has spent the last four years in the vibrant city of Shanghai to extend her global reach, as well as to learn from the rapidly changing Chinese market. Her exceptional career is only matched by her deep love for animals and the environment, which she serves through her role with an NGO in Africa. Her spare time is spent traveling and exploring new parts of the world. Skill Level: Beginner-Intermediate Learn How To: Understand and practically apply the key skills necessary for effective project management at every stage of the project management process Identify, leverage, and enhance your natural skills and abilities for successful project management Kick-off and manage projects with engaged stakeholders, clear goals, and aligned teams Lead teams and projects, and generate buy-in... even if you're not a manager Who Should Take This Course: Project management isn't just for project managers--almost everyone plans and runs a project at some point. This course is tailored to anyone who is looking to develop or enhance their skills at effectively and successfully managing any project: Project Managers Anyone who finds themselves managing a project Anyone who is looking to upskill their project management skills About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886649 , 1835886647
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Computer science Mathematics ; Apprentissage automatique ; Informatique ; Mathématiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course starts with an introduction to the key concepts and outlines the roadmap to success in the field. You'll begin by understanding the foundational elements of matrix and vector derivatives, exploring topics like linear and quadratic forms, chain rules in matrix form, and the derivative of determinants. Each concept is reinforced with exercises, ranging from quadratic challenges to least squares and Gaussian methods. The course progresses into optimization techniques essential in data science and machine learning. Delve into multi-dimensional second derivative tests, gradient descent in one and multiple dimensions, and Newton's method, including practical exercises in Newton's Method for least squares. An additional focus is set on setting up your environment, where you'll learn to establish an Anaconda environment and install crucial tools like Numpy, Scipy, and TensorFlow. The course also addresses effective learning strategies, answering pivotal questions like the suitability of YouTube for learning calculus and the recommended order for taking courses in this field. As you journey through the course, you'll transition from foundational concepts to advanced applications, equipping yourself with the skills needed to excel in data science and machine learning. What you will learn Understand matrix and vector derivatives Master linear and quadratic forms Apply the chain rule in matrix calculus Solve optimization problems using gradient descent and Newton's method Set up the Anaconda environment for machine learning Install and use key libraries like Numpy and TensorFlow Develop effective strategies for learning calculus in data science Audience This course suits students and professionals eager to learn the math behind AI, Data Science, and Machine Learning, ideal for deepening knowledge in these advanced technology fields. Learners should have a basic knowledge of linear algebra, calculus, and Python programming to effectively understand matrix calculus. A keen interest and enthusiasm for exploring this intricate subject are also crucial for a fulfilling learning experience. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135319673 , 0135319676
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Computer security Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Master AWS Security with our AWS Certified Security Specialty Exam Prep Course! Review all objectives and learn what's new in the AWS SCS-C02 exam. Explore the principles and uses of AWS's key security services. Experience real-world practice questions so you can develop skills to eliminate incorrect answers and tackle exam scenarios with precision. Are you ready to excel on the AWS Certified Security Specialty (SCS-C02) exam? Explore the latest knowledge areas, services, domains, and features of the exam in this comprehensive video course. Designed for success, this course ensures you understand key concepts and strategies critical for achieving certification. Best-selling author and trainer Chad Smith will also help you gain insights into the AWS Certified Security Specialty exam and teach best practices for exam day confidence. Related Learning Sign up for AWS Certified Security - Specialty (SCS-C02) Crash Course by Chad Smith About the Instructor Chad Smith is a technology professional, author, and trainer focused on cloud infrastructure and management. He is the Principal Cloud Architect at Brightkey.cloud and has a wealth of personal real-world experience in cloud adoption, infrastructure design, operations, and security. Chad holds current AWS certifications in Architecture, SysOps, Security, Networking and Databases, and is also certified in CompTIA Cloud+. You can follow Chad here: Twitter: brightkey_cloud LinkedIn: https://www.linkedin.com/in/chadsmith1973/ Professional Blog: https://www.brightkey.cloud Email: chad@brightkeycloud.com Skill Level Intermediate Course requirement None.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886502 , 1835886507
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 25 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Risk management ; Sécurité informatique ; Gestion du risque ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 610.285
    Keywords: Medical informatics ; Artificial intelligence ; Artificial Intelligence ; Médecine ; Informatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Generative AI has the potential to transform every aspect of healthcare--from personalized patient care and drug discovery to enhanced medical imaging and robot-assisted surgeries. Physicians are taking advantage of state-of-the-art tools like ChatGPT to better connect with their patients and manage medical records. Like any emerging technology, there are benefits and challenges to using AI in medicine. Join us and leading industry experts to learn more about the next-generation AI tools, techniques, and applications driving innovation in healthcare. What you'll learn and how you can apply it Uncover the benchmarks and best practices enabling academic medical centers, pharmaceuticals, and health IT companies to build real-world LLM-based applications Discover how graph databases are reshaping life sciences, catalyzing breakthroughs, and steering healthcare toward impactful, personalized outcomes Explore powerful new generative AI tools designed to enhance the search capabilities of AI models and provide highly accurate LLMs for medical Q&A and summarization Learn how to develop LangChain applications for disease diagnosis and screening Discover generative, predictive, and hybrid AI models that offer comprehensive solutions for complex medical challenges This live course is for you because... You're an AI/ML engineer or data practitioner who wants to broaden your skill set and apply your knowledge to the healthcare industry. You're a medical practitioner looking to explore the latest advancements in AI technology. You're a healthcare leader who wants to implement AI technology in your organization. Recommended follow-up: Read Prompt Engineering for Generative AI (book) Read Developing Apps with GPT-4 and ChatGPT (book) Read Low-Code AI (book) Watch ChatGPT: Possibilities and Pitfalls (video) Read AI-First Healthcare (book) Read Generative Deep Learning, second edition (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: "Live courses.". - Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Logiciels d'application ; Développement ; Automatisation ; automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In DevOps, SRE, and operations, toil is the enemy. Fortunately, the repetitive and time-consuming manual work that drains team resources is steadily being automated. As a result, the automation tooling landscape has expanded to encompass a wide range of tasks. Whether it's testing, infrastructure configuration and management, provisioning, monitoring, or observability, there's now a tool to automate it. Evaluating and choosing among these tools is critical to the success of DevOps and SRE. Join us for in-depth sessions with leading experts to explore what it means to automate, what successful automation looks like, and how to assess the available tools and determine the right ones for your needs. What you'll learn and how you can apply it Understand how to tame your infrastructure as code using architectural patterns for infrastructure as code architecture Learn the basics of working with Terraform in production environments Explore the integration of Crossplane and Kyverno to automate cluster creation, resource configuration, compliance enforcement, add-on deployment, and security checks This live course is for you because... You're a DevOps engineer or SRE for whom understanding and implementing automation is part of the job. You're a platform engineer tasked with evaluating and implementing an automation toolchain that drives developer efficiency by reducing toil. You're a sysadmin or an operations engineer who wants to learn a more efficient, nonmanual way to build, control, and modify your infrastructure. Recommended follow-up: Read Infrastructure as Code, second edition (book) Read Terraform: Up and Running, third edition (book) Read Infrastructure as Code: Patterns and Practices (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/03802855745
    Keywords: Data warehousing ; Big data ; Entrepôts de données (Informatique) ; Données volumineuses ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sponsored by Dremio Storing, processing, and moving data efficiently and cost-effectively in the cloud is a must for working with today's enormous datasets. These expert-led sessions deliver insight into how to increase the scalability, speed, and availability of your data and equip you with a set of best practices for utilizing your data warehouse, data lake, or data lakehouse. What you'll learn and how you can apply it Get an overview of the latest technologies for storing and managing your data Learn best practices for standardizing lakehouse data modeling and pipelining Find out how to streamline data lake implementation Explore how to securely develop and implement ML models on a cloud data warehouse Discover the benefits of data contracts in the modern data stack Understand how to enhance lakehouse infrastructure for multimodal AI This Superstream recording is for you because... You're a data or software engineer or solution architect who's interested in learning about the latest trends in storing, processing, and managing data. You want to improve the scalability, speed, and availability of your data. You want to better understand the systems that you already use and learn how to take full advantage of their capabilities. Recommended follow-up: Read Deciphering Data Architectures (early release book) Read Practical Lakehouse Architecture (early release book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138293321 , 0138293325
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Become a Linux power user! Overview: Learn the ins and outs of Linux Internals and discover what makes Linux the most powerful operating system Get under the hood and understand how Linux really works Perform in-depth practical investigations of key Linux functionalities Linux Under the Hood offers an extensive exploration of how Linux functions, allowing you to fully harness its capabilities. Familiarizing yourself with Linux internals will allow you to surpass mere commands and gain valuable insights to optimize your use of Linux. The first module dives into a deeper understanding of Linux architecture; you will learn about the inner workings of key Linux components like the kernel, systemd, and the Linux boot procedure. The following module will focus on storage and filesystems, encompassing local devices as well as cloud and datacenter storage solutions. Next, we will cover core components, including memory, processes, and the intricacies of command execution. Finally, we will explore Linux's evolution into a container-based platform. Each lesson concludes with a real-world scenario, where Sander demonstrates the practical implementation of various features explained in the lesson videos. Sign up for live training classes by Sander van Vugt: Linux Under the Hood (Updated) If you believe your knowledge of the Linux operating system is limited, you can start with Sander's Linux Fundamentals, 2 nd edition video course. About the Instructor: Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level: Intermediate to advanced Course requirement: Learners are expected to have basic working knowledge of the Linux operating system. Learners should prepare one virtual or physical machine with any Linux distribution; hardware specs are not important. To make it easy to follow along with the instructor, it is recommended (but not required) to install either the latest version of Ubuntu LTS (either workstation or server edition) or the latest CentOS Stream or equivalent. Who Should Take This Course: The target audience for this course consists of people that have used Linux for a while and who want to know what it really is doing. The typical primary audience consists of system administrators. The secondary audience consists of operating system students and others who want to know how Linux works. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/85
    Keywords: SQL (Computer program language) ; SQL (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. Build web services to serve data with Python standard library Analyze and process extracts with Linux utilities Chain MySQL, Python, and Linux together for quick data tasks Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Architecture logicielle ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Interactive Technical Projects A weekly updated series of tutorials on interactive technical projects Learning Objectives Learn practical skills by building real-world projects with cutting-edge technologies Learning to build full stack solutions with languages like Rust, Python, LLMs and Data Science Learning the key tools and techniques used by industry experts to create robust applications Get hands-on practice applying your core technical knowledge Understand how all the pieces fit together by building projects end-to-end Troubleshoot bugs and solve complex problems that appear in production systems Expand your portfolio and r©♭sum©♭ with impressive projects Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 9781835883549 , 1835883540
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This in-depth masterclass provides end-to-end coverage of developing enterprise-grade LLMs tailored to your unique use cases. Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. You'll learn how to make crucial architecture decisions, select optimal model types, configure hyperparameters, and curate quality training data. Discover professional techniques for pre-training, iterative fine-tuning, and rigorous model evaluation. The instructors reveal insider strategies to productionize your LLMs smoothly, monitor them proactively, and maintain optimal performance post-deployment. Following a structured curriculum spanning the complete LLM lifecycle, this masterclass empowers you with hands-on skills to build, refine, and deploy large language models with confidence. Turbocharge your generative AI initiatives and get the practical knowledge needed to create LLMs that solve complex challenges for your organization. What you will learn How to select the right LLM architecture for your use case Approaches for sourcing, cleaning, and labeling quality training data Pre-training methods and hyperparameter optimization Advanced fine-tuning techniques to boost performance Ways to thoroughly evaluate LLMs before deployment Best practices for monitoring, updating, and maintaining production LLMs Audience Data scientists, machine learning engineers, and AI developers seeking an in-depth understanding of large language model (LLM) development. This masterclass is designed for professionals aiming to build, optimize, and deploy enterprise-grade LLMs tailored to specific use cases, with a focus on practical skills and real business impact. About the Authors Maxime Labonne: Sr. Machine Learning Scientist, JPMorgan. Denis Rothman: Expert in AI Transformers including ChatGPT/GPT-4, Bestselling Author. Abi Aryan: ML Engineer and Author.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138303921 , 0138303924
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "4+ Hours of Video Instruction Leverage the power of Agile estimating and planning to manage client and stakeholder expectations throughout every stage of software development. Overview The inevitable questions while navigating a software development project with a customer are ""When will it be done?"" and ""How much will it cost?"" In this video, Agile expert Tommy Norman shows you how to manage these client and stakeholder expectations using Agile estimating and planning. You will learn how to move beyond the limitations of the time-money-scope iron triangle and address your customer's concerns by understanding their overarching business goals. You will learn how to scope and estimate for a software project with minimal information, as well as how to use product visioning, personas/goals, and story mapping to ensure everyone understands the why, who, and what of the product they are building. You will explore strategies to maximize the Product Backlog's value and how to continually integrate new insights. You will discover how the Product Backlog influences the Release Plan and how it can surface early indicators that reveal the need for potential adjustments to scope and schedule. Finally, you will learn to assess the impact of deliverables on business outcomes and how to incorporate these lessons back into the Product Backlog. About the Instructor Tommy Norman (CSM, A-CSM, CSPO, CSP, CTC, CEC, CAL, PSM, SAFe Agilist, Microsoft MVP) has had an IT career spanning over 30 years, he has been helping organizations of all sizes and shapes build great software with a practical approach in a multitude of roles. He has worked deeply with the Agile community as the coordinator of the Agile Nashville user group, is founder of the Music City Agile conference, a popular contributor to Pearson's Live Online Training Program and Video Courses available on the O'Reilly Learning platform, and a frequent local and international speaker. Learn How To Align with stakeholders' business goals using product visioning activities. Give enough upfront forecasting to make sound budgeting decisions using a simple estimation process. Use personas and story mapping to focus on end-user value delivered. Apply empirical data to a simple and highly reliable release plan approach to help customers maximize value and learning. Use operational style review points to get ahead of any issues and keep the team and stakeholders in constant alignment. Who Should Take This Course Individuals seeking outcomes in Agile software development, aiming to maximize product value. Those tasked with forecasting the cost and duration of an upcoming software development effort who want to do so with an Agile approach. Individuals tracking the progress of an Agile software development effort who need practical methods to set expectations with teams and stakeholders. Course Requirements You should have a basic understanding of Agile software development using a framework such as Scrum or Kanban. Lesson descriptions Lesson 1: This lesson explores the underlying needs behind the questions "When?" and "How Much?" and the best way to meet these needs. It covers how to manage expectations and the importance of a successful beginning to any software development effort. Lesson 2: This lesson covers how to set initial expectations with subsequent efforts in mind. It discusses how to identify the true business value of a software development project, how to estimate time and cost with enough accuracy to support solid decision making, and how to assess the feasibility of a software development effort. Lesson 3: This lesson covers getting a software development effort started. It focuses on the "why" and "how" of solving end users' problems and demonstrates populating the initial product backlog. Lesson 4: This lesson covers how to approach estimating for a software development effort. It explores the benefits of focusing more on conversations and less on estimates to best develop a sense of time and scope for a project. Lesson 5: This lesson covers the art of release planning. Using the product backlog and estimates worked out in the previous lessons, it demonstrates how to create a release plan that makes time, money, and value obvious to your stakeholders and your team. Lesson 6: This lesson covers how to leverage empirical data for an agile approach to release planning. It discusses the importance of good metrics, and how such metrics can inform modifications to the release plan and allow us to adjust expectations appropriately. Lesson 7: This lesson underscores that estimating and planning is all about expectation management. It shows how to use tools and techniques taught in preceding lessons to create short feedback loops. Tommy shares his favorite ways of reviewing progress and new information, and illustrating how the team's efforts are helping stakeholders achieve the right outcomes. Lesson 8: This lesson covers how to successfully implement agile estimating and planning using applicable real-world examples and discusses how to scale these principles and practices. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.".
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Power BI (Computer file) ; Business intelligence Computer programs ; Information visualization Computer programs ; Business Data processing ; Visualisation de l'information ; Logiciels ; Gestion ; Informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Learning Power BI is crucial for anyone who wants to enter the field of data analytics or advance their career in it. With the exponential growth of data in every industry, the ability to collect, analyze, and present data in a clear and concise manner is becoming more and more valuable. In this course, attendees will learn how to work with Power BI in real-life scenarios, discover the most frequently used functionalities of the tool, and gain insight into the most efficient techniques used by professionals in the field. This course is highly recommend this course to those who are pursuing a career in data analytics within their own organizations or as consultants.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138312923 , 0138312923
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Data encryption (Computer science) Study guides Examinations ; Computer security Study guides Examinations ; User interfaces (Computer systems) Study guides Examinations ; Cloud computing Study guides Examinations ; Chiffrement (Informatique) ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Interfaces utilisateurs (Informatique) ; Examens ; Guides de l'étudiant ; Infonuagique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Are you gearing up for the HashiCorp Certified Vault Associate exam? Look no further! Our comprehensive training program is designed to equip you with the essential skills needed to pass the certification and learn how to use Vault effectively in the field. The HashiCorp Certified Vault Associate video course provides: Effective Exam Preparation with all objectives in the exam covered in detail. Skills: Acquire the skills needed to use HashiCorp Vault in the terminal and web browser. Hands-On Labs: Participate in labs that empower you to gain experience using Vault within the CLI, UI, and API. Practice Quiz Questions: Access practice quiz questions for guided question breakdowns. See first-hand how to successfully navigate the exam, boosting your confidence and exam readiness. Related Learning: HashiCorp Certified Terraform Associate (003) by Dave Prowse About the Instructor: Dave Prowse has more than 20 years of experience in the IT field. He solves problems for organizations using Linux, infrastructure as code, and many other types of technology. He loves to teach these solutions to others. Dave is an advocate of lifelong learning, self-improvement, building confidence, and the sharing of knowledge. You can follow Dave at Prowse Tech: https://prowse.tech/ Skill Level: Intermediate Prerequisites What prior knowledge or experience do attendees need to get the most out of class? Understanding of core security concepts such as: encryption, authentication, tokens, and secrets Knowledge of cloud-based technologies Experience with Linux, Bash, Git and an IDE (such as VSCode) Course Set-up A computer system to work on and run Vault. As a best practice, it is recommended that attendees use a Linux virtual machine (Ubuntu, Debian, Fedora, etc...) for the labs, preferably with at least 2 CPUs and 4 GB RAM. The instructor will be demonstrating on a Debian virtual machine. To follow along with the labs, the system should have the following: The Vault CLI installed: https://developer.hashicorp.com/vault/docs/install VSCode installed: https://code.visualstudio.com/download Download this git repository: https://github.com/daveprowse/vac-course An AWS account with a separate IAM user (for testing purposes): https://aws.amazon.com/account/ Note: Attendees might incur a small charge from Amazon when running the AWS-based labs. Attendees can opt-out of running these labs and instead watch the instructor demos. Two monitors/systems recommended: One for the virtual machine, and one to watch the instructor demos.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Artificial intelligence ; Architecture logicielle ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Over the past year, generative AI has dominated headlines. We know that it's being used to write code, but how can you leverage its power in software architecture when every company's architecture is different? How can you convert the knowledge automated by AI into the wisdom required for software architecture? What are the best ways to use this powerful tool to improve your architecture's security and resiliency? Join us to discover how AI may impact software architecture and how you can use it in your architectural processes right now. You'll explore AI for SaaS architecture, how to use AI to create diagrams, and more. If you're looking to stay one step ahead, these sessions are for you. What you'll learn and how you can apply it Understand the possibilities and risks of AI so you can judge when and how to use it Learn how GenAI mechanisms can influence core SaaS architecture strategies and how you can implement this in your SaaS solution Explore the use of prompt engineering for architectural tasks and leverage generative AI to improve their work This live event is for you because... You want to understand how to use generative AI to improve and communicate your software architecture. You're a senior-level developer who wants to make the move to architect. You're a practicing software architect who wants to hone your skills and learn new software architecture techniques and practices. Recommended follow-up: Read Building Multi-Tenant SaaS Architectures (book) Read Communication Patterns (book) Read Software Architecture: The Hard Parts (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038011
    Keywords: Management information systems ; Business Data processing ; Big data ; Systèmes d'information de gestion ; Gestion ; Informatique ; Données volumineuses ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: An increasing number of organizations are adopting data mesh due to its ability to explain and address the frustrations that many organizations experience as they try to get value from data at scale. Data mesh treats data as a product, considers domains as a primary concern, applies platform thinking to create self-serve data infrastructure, and introduces a federated computational model of data governance. This course will show you how to holistically combine the changes to the technical landscape and the operational model required for data mesh to succeed. You will explore domain ownership, data as a product, how to create a strong developer experience, and federated governance. Once you have completed the course, you will be able to understand the different elements of data mesh in practice and have the confidence to drive data mesh adoption in your company. What you'll learn and how you can apply it: Understand the intent and value behind the foundational elements of data mesh, and have the confidence to participate in a data mesh adoption. This course is for you because: You are or are interested in becoming, involved in a data mesh adoption. You have a stake in successful data use at scale-you're a machine learning practitioner, a data engineer, an engineering manager with responsibility for data or a leader of a technical organization. You are interested in problems at the intersection of business, data and collaboration. Prerequisites Either: Practical experience implementing distributed transactional systems. Practical experience implementing analytical systems. Recommended follow-up: Read Designing Data-Intensive Applications to deepen your technical understanding of data systems at scale. Read Creating a Data-Driven Organisation for a broader look at how to structure an organization to maximize value from data. Read Fundamentals of Data Observability to learn about how to automate data quality checks. Read Enterprise Data Catalog for a deep dive into the discovery part of data management.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880760 , 1835880762
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.15/5
    Keywords: Risk management ; Information technology Security measures ; Gestion du risque ; Technologie de l'information ; Sécurité ; Mesures ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The NIST 800-37 Risk Management Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology to assist organizations in managing and mitigating information security risks effectively. It provides a structured approach to risk management, emphasizing continuous monitoring and a lifecycle process for securing information systems. The NIST 800-37 Risk Management Framework (RMF) guides organizations through a systematic risk management process. It begins with "Prepare" to establish context and allocate resources, followed by "Categorize" for classifying information systems. The subsequent steps include "Select Controls" to tailor security measures, "Implement Controls" to put them into practice, "Assess Controls" for effectiveness evaluation, "Authorize" for system approvals, and "Monitor" for continuous oversight and response to changes in the information system's environment. Upon completion, you will possess a clear understanding of the framework principles and components. Armed with this knowledge, navigate the risk management lifecycle with confidence. You will gain proficiency in identifying, assessing, and prioritizing risks, selecting and implementing security controls, and ensuring continuous monitoring and authorization aligned with industry best practices. What you will learn Understand core principles and significance of NIST 800-37 RMF Learn methodologies for risk identification and prioritization Choose and implement controls based on organizational risk Assess implemented controls and identify vulnerabilities Grasp the steps to grant system and information authorizations Integrate NIST 800-37 RMF with other compliance frameworks and standards Audience The course is tailored for cybersecurity professionals, including risk managers, information security officers, compliance officers, IT and security managers, and risk assessment professionals. Geared toward individuals with a foundational knowledge of cybersecurity, the course equips you with skills to navigate the risk management lifecycle. You will gain proficiency in risk identification, assessment, and prioritization, and implementation of security controls. The course addresses RMF integration with compliance frameworks for those overseeing regulatory compliance within organizations. About the Author Alexander Oni: Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/09
    Keywords: Goal (Psychology) ; Motivation (Psychology) ; Motivation (Psychologie) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Performance reviews often produce a rollercoaster of emotions, reduced productivity, and increased workload and frustration for employees, managers, and HR business partners. This is because most new managers are not provided with training on how to work with their reports to identify, set, and track S.M.A.R.T. goals. Without realistic, achievable goals, filling out the requested review documents is painstaking and laborious. By the end of this course, the learner will have core goal setting skills that are brand agnostic so they can be utilized across organizations and business units. They will learn how to empower their team to define and write their own S.M.A.R.T. goals, all while ensuring full accountability. What you'll learn and how you can apply it Qualifying coaching questions to understand direct reports motivations and BHAGs Process to empower your team to define and write their S.M.A.R.T. goals Simple planning methodology Goal tracking recommendations 360 accountability (holding yourself and your direct reports accountable to achieve their goals) This course is for you because: You're a newly promoted manager looking for a process that helps facilitate goal setting and structured accountability for your team. You're a new people manager who is entering your first round of performance reviews. While you understand the company mandated deliverables, you are unsure how to structure conversations with your direct reports to complete them. You're a fairly new manager. While you have been through cycles before, your team is preparing for the next performance review cycle and you need to simplify the process. Prerequisites: Beginner knowledge of S.M.A.R.T. goals.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135313022 , 0135313023
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Kubernetes ; Application software Development ; Computer programs ; Logiciels d'application ; Développement ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Electronic data processing Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this course we focus on preparing you for successfully sitting for the challenging CompTIA Data Plus DA0-001 exam. Data is considered the most important asset for enterprise organizations and as a data professional you will be able to provide immediate value to data driven organizations with the Data Plus certification. CompTIA Data+ is a very challenging exam and successful passing will validate that certified professionals have the skills required to facilitate data-driven business decisions and also provide immediate value to the enterprise. Data professionals must know about data mining, data manipulation, and visualizing and reporting data to stakeholders. So, whether applying basic statistical methods or analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle, a data professional is an important role to enterprises. This course will prepare you to prove your data science skills by successfully taking for the CompTIA Data Plus exam. What you'll learn and how you can apply it By the end of this course, you will: Understand the importance of the CompTIA Data Plus exam and its objectives. Learn how to collect, analyze, and report on various types of commonly used data. Learn about how to transform raw data into usable information for your stakeholders. Learn about database types, data structures, data schemes and other important aspects of data management. Understand how JSON data, HTML data, and XML data is used with data professionals. Understand how ETL and ELT processes work, how APIs connect us to the cloud and learn about profiling datasets. Learn about data manipulation techniques and important concepts around data transposition and normalization. Learn about descriptive statistics, inferential statistics, and various analytic techniques. Identify common analytics tools used in data analysis. Learn about the importance of Structured Query Language (SQL) and its main components. This course is for you because... You're a current or aspiring Data Engineer, Data Analyst, Data Architect, Database Manager or others IT professional interested in managing data. Prerequisites To get the most of this course it is recommended to have the following experience and/or resources: Basic hands-on SQL Database experience around relational database A computer with any version of Excel installed (if you don't already have it, you can sign up for a free 30-day trial).
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; Technology Leadership ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Technologie de l'information ; Gestion ; Technologie ; Leadership ; Audiobooks ; Livres audio
    Abstract: This is the one stop shop for all of the 2024 Tech Leadership Tuesday interviews in their audio format. Keep up-to-date with Michael Lopp and his colleagues on their tech leadership journeys.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Natural language processing (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Join host George Anadiotis and guest Eric Xing, for a discussion about the current and expanding field of open-source large language models and how they are impacting the development of generative AI. We’ll cover technical aspects, as well as the business and policy concerns related to open-source LLMs.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835885567 , 183588556X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with the basics of terminals and shells, setting the foundation for interaction with Linux at a fundamental level. It progresses to cover essential commands for navigating the filesystem and managing files, ensuring students can efficiently organize and manipulate data within the Linux environment. The journey continues through advanced topics such as process management, storage optimization, and package management across Debian and Red Hat systems, ensuring a well-rounded skill set. The course focuses on practical skills, including installing software from source, navigating text editors like vi, vim, and nano, and managing environment variables and file permissions. It emphasizes the importance of these skills in real-world scenarios, illustrating how they contribute to effective system administration and development practices. The course wraps up by exploring file systems, locating files, and utilizing other useful commands that streamline daily tasks. By the end of this course, students will have navigated through the most significant aspects of the Linux command line, equipped with the knowledge to apply these skills in a professional setting.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Hoboken, New Jersey] : Pearson
    ISBN: 9780138359607 , 0138359601
    Language: English
    Pages: 1 online resource (1 video file (39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 808.5/1
    Keywords: Business presentations ; Public speaking ; Présentations (Affaires) ; Art de parler en public ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Many people find public speaking to be anxiety-inducing. This fear prevents them from giving a compelling presentation, which only reinforces their belief that they are terrible at speaking in public. Anyone—not just professionals—can speak easily and effectively in public; you just need to learn how. In this course, veteran television producer and director, Larry Jordan, uses real-life examples to explain the simple and time-tested techniques for improving and perfecting your presentation skills. You’ll discover how to successfully overcome the fear of public speaking and how to present yourself on stage, in person, or virtually. Then, you’ll learn how to use readily available design tools to make your slide presentation pop off the screen to keep your audience’s attention and clearly articulate your message, without distracting from you as the speaker. Finally, you’ll watch as Larry shows you how to pull it all together to create and deliver a powerful presentation.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835464359 , 1835464351
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Penetration testing (Computer security) ; Sécurité informatique ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a solid foundation in Access Control and Password Management, setting the stage for a deep dive into the intricacies of cybersecurity. It progresses into exploring Active Defense mechanisms and the development of effective Contingency Plans, ensuring you're prepared for any security incident. The journey continues with an exploration of Critical Controls, Basic and Advanced Cryptography, ensuring a well-rounded understanding of key security principles. The course focuses on laying out a Defensible Network Architecture, Endpoint Security, and enforcing Windows and Linux security, providing a detailed look at how to secure modern operating systems and their networks. Through practical examples, you'll learn about Incident Handling and Response, IT Risk Management, and the importance of Security Policies and Virtualization for a robust cybersecurity posture. The course wraps up by covering Web Communication Vulnerabilities, Vulnerability Scanning, and Penetration Testing techniques, equipping you with the skills to identify and mitigate potential threats effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dirty data is everywhere. Have you had a letter addressed to you with your name misspelled? That's dirty data. Do you have trouble finding a product on a website because it's not in the right category? That's dirty data. Do you have trouble finding a person or company name in your system because of a typo? That's dirty data. And it causes problems, lots of problems. Before software implementation, machine learning and AI, you need clean data. It's THE most important thing to fix before doing any of these things, and we're all expected to be able to clean or fix this data, yet no one tells us how to do it! Some of the most common data problems occur in name, address, email and phone number data, and this course will cover this off. While there are many data-cleaning tools out there, almost everyone uses Excel, including non-data professionals, and it's important to have the skills to be familiar with and be able to get to know your data before you use these tools. It's essential to be able to spot and fix errors in Excel first, and understand when the data isn't right so you know if you can trust those fancy tools or not! This course will help you achieve this and you'll learn: What is dirty data? The importance of data quality Tips for cleaning data in Excel How to clean names, addresses, emails and phone numbers in Excel You'll even get your own dirty data set to work on! This course is for you because... You have data quality issues in your organization and would like your team to understand the importance of data quality and how to improve it. You're a data professional spending a significant amount of time cleaning data and would like to work more efficiently. You're not a data professional, but work with data and want to work more efficiently with it. Prerequisites: Some experience of Excel would be beneficial.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Ever wished for the eyedropper tool, commonly found in PowerPoint, to be available in Excel? Well, this one’s for you. This lesson explores the Colour Picker feature in Excel. You can pick colours from one element and apply them consistently across your spreadsheet. We’ll guide you through the installation process, highlight the tool’s capabilities, and even provide an easy shortcut for quick access – all to maintain consistent colours across your charts and shapes in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Electronic spreadsheets ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've ever imported data from the web and found pesky wildcard characters like asterisks messing with your cell contents, this lesson is your solution. We'll demonstrate how to locate and replace wildcard characters efficiently. Using the standard Find and Replace might seem straightforward, but there's a catch – the asterisk (*) is a wildcard character in Excel. Clicking ""Replace All"" with the asterisk alone will erase everything in the cell, as the wildcard denotes ""all."" We've got a simple trick for you. We can precisely target and replace just the unwanted character. Learn this clever technique and save yourself from data cleanup frustration.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Language: English
    Pages: 1 online resource (1 video file (54 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3028/7
    Keywords: Software measurement ; Computer software Evaluation ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: With engineering leaders under increasing pressure to quantify engineering performance, there’s no shortage of opinions or frameworks suggesting which engineering metrics matter most. Join Peter Bell, CTO of Rare Talent, and guests for a discussion about how to select the metrics that matter for your organization’s success. Through this expert panel discussion, you’ll learn why selecting engineering metrics is so challenging, what considerations and trade-offs should be taken into account, the problems with commonly used metrics, and how to have more productive conversations about how metrics relate to executives’ key business goals. CTO Hour is a quarterly live event that brings together a panel of senior engineering leaders to discuss with expert and host Peter Bell how they’ve approached timely technology or business challenges. This dynamic event features ample time for questions. Active and aspiring senior leaders will learn valuable insights from top VPs and CTOs and ultimately be prepared to make better-informed decisions as heads of technology.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835467503 , 1835467504
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by laying a solid foundation with an overview of capacity planning, ensuring you understand how to measure and optimize system resources effectively. It then dives into the technicalities of monitoring CPU, memory, disk, and network activity, crucial for maintaining system health and performance. The course focuses on deepening your understanding of Linux's core, including kernel components, modules, and the intricacies of compiling a kernel. You'll learn how to monitor and manage the kernel for peak efficiency, alongside exploring systemd and SysV init systems for better process management. Additionally, system recovery techniques, fstab configuration, and managing swap partitions are thoroughly covered to ensure system resilience. The course wraps up with practical skills in managing storage solutions, network configurations, and troubleshooting, alongside essential system administration tasks such as installing programs from source and effective backup strategies.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson examines calculation methods. If terms like AVERAGE function and SUMPRODUCT have left you confused, fear not – our step-by-step guide is here to simplify things for you. We start by demonstrating how to find a regular average using the AVERAGE function. However, the real game-changer comes when you explore the nuances of weighted averages, where certain disciplines hold more weight than others. We break down the process of assigning percentage-based weight values. Whether you're a beginner or an experienced Excel user, this lesson will ensure you confidently grasp the details of weighted averages.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've mastered the basics of Excel and are ready for a challenge, this lesson is your ticket to understanding the powerful LAMBDA function. LAMBDA empowers you to craft custom functions within Excel, offering a game-changing ability to simplify lengthy and intricate formulas. In this lesson, we’ll explore the LAMBDA function by breaking down its components. By naming cell ranges and creating user-friendly variables, we transform complex calculations into reusable functions. Watch as we guide you through the step-by-step process of turning a conventional formula into a LAMBDA and converting it into a versatile function. Whether you're dealing with intricate financial models or complex data analyses, mastering LAMBDA opens the door to efficiency and flexibility in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Hoboken, New Jersey] : Pearson
    ISBN: 9780138314767 , 0138314764
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Reflection is a powerful Java feature that can be used to expand the capabilities of a program, to examine the class or object internals at runtime. Java Reflection is quite powerful and can be very useful. Java Reflection makes it possible to inspect classes, interfaces, fields, and methods at runtime, without knowing the names of the classes, methods, etc. at compile time. Java Reflection is useful for creating generic code, implementing dynamic frameworks, and testing and debugging. In this course, we start with the basics, then show how reflection works with the more modern language features such as sealed classes and records. We also show how arrays can be manipulated and created via reflection. Lastly, we show MethodHandle and VarHandle. Learn from hands-on exercises that are followed by demos revealing the solutions.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835886007 , 1835886000
    Language: English
    Pages: 1 online resource (1 video file (34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: UNIX Shells ; Computer networks Security measures ; Data encryption (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Software engineering ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Software development is increasingly central to a business’s identity. But as the complexity of the practice grows, the demand is high for developers who operate at a senior level. And the rise in generative AI tools means that even expert developers must recalibrate how they work to keep up with the pace of development. Join us to level up your skills and accelerate your journey to senior software engineer. These in-depth sessions cover some of the biggest challenges facing software developers today, teaching you practical methods and best practices to improve coding and software design, better manage data, mentor new engineers, and collaborate with your team.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) Juvenile films ; Computer programming Juvenile films ; Python (Langage de programmation) ; Films pour la jeunesse ; Programmation (Informatique) ; Films pour la jeunesse ; children's films ; Instructional films ; Children's films ; Nonfiction films ; Internet videos ; Films de formation ; Films pour enfants ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A Pythonic Adventure teaches you to code by asking questions, making errors, and trying out different solutions—just like in real life. As you go, you’ll create a web application for a coffee shop step-by-step, from your first online menu to saving orders in a database. And this unique tutorial goes deeper than other beginner books. You’ll learn and practice important skills like planning applications, finding bugs, and managing user expectations.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 10 min.)) , sound, color.
    Edition: Video edition.
    DDC: 006.3
    Keywords: Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Generative AI tools like ChatGPT are amazing--but how will their use impact our society? This book introduces the world-transforming technology and the strategies you need to use generative AI safely and effectively. Introduction to Generative AI gives you the hows-and-whys of generative AI in accessible language. In this easy-to-read introduction, you'll learn: How large language models (LLMs) work How to integrate generative AI into your personal and professional workflows Balancing innovation and responsibility The social, legal, and policy landscape around generative AI Societal impacts of generative AI Where AI is going Anyone who uses ChatGPT for even a few minutes can tell that it's truly different from other chatbots or question-and-answer tools. Introduction to Generative AI guides you from that first eye-opening interaction to how these powerful tools can transform your personal and professional life. In it, you'll get no-nonsense guidance on generative AI fundamentals to help you understand what these models are (and aren't) capable of, and how you can use them to your greatest advantage. About the Technology Generative AI tools like ChatGPT, Bing, and Bard have permanently transformed the way we work, learn, and communicate. This delightful book shows you exactly how Generative AI works in plain, jargon-free English, along with the insights you'll need to use it safely and effectively. About the Book Introduction to Generative AI guides you through benefits, risks, and limitations of Generative AI technology. You'll discover how AI models learn and think, explore best practices for creating text and graphics, and consider the impact of AI on society, the economy, and the law. Along the way, you'll practice strategies for getting accurate responses and even understand how to handle misuse and security threats. What's Inside How large language models work Integrate Generative AI into your daily work Balance innovation and responsibility About the Reader For anyone interested in Generative AI. No technical experience required. About the Authors Numa Dhamani is a natural language processing expert working at the intersection of technology and society. Maggie Engler is an engineer and researcher currently working on safety for large language models. The technical editor on this book was Maris Sekar. Quotes Essential for anyone eager to understand or work with this transformative technology. - Ron Green, Co-Founder & CTO, KUNGFU.AI Become an active participant in the conversation on the societal implications of generative AI. A must read! - Edgar Markevicius, Meta Clear and compelling. I highly recommend this book to anyone interested in generative AI and its impact on the world. - Kenneth R. Fleischmann, Founding Chair of Good Systems: Ethical AI at UT Austin Perfect. I can think of no defter guides to Generative AI and the promise and peril it portends. - Dr. Daniel Rogers, The Global Disinformation Index.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Ever struggled with chaotic data columns? In this lesson, we share a quick Excel hack: skip manual dragging and dropping by using a numbering system. Assign a numerical order to columns, select your dataset, and opt for left-to-right sorting in the Data tab. Whether it's a compact sheet or a vast dataset, this method streamlines Excel data management and is guaranteed to save you time. Join us to learn this efficient trick for hassle-free column sorting. Enhance your data analysis workflow and leave behind the tedious task of manually rearranging columns in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The Advanced Filter feature provides an alternative to the more commonly used dropdown menus and the FILTER function. This lesson guides you through the steps of using the Advanced Filter to extract specific data based on criteria. While it proves effective in isolating desired information, we also address a drawback – the lack of automatic updates for changed criteria. However, we offer a quick solution: creating a user-friendly macro and assigning it to a button for seamless data refresh, making the Advanced Filter even more accessible and efficient. Whether you're a seasoned Excel user or just starting, this lesson is a valuable addition to your toolkit.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson showcases efficient data organisation with WrapRows. It provides insights for both Microsoft 365 users and those on other Excel versions. We'll address the need to split a dataset into distinct columns with a streamlined approach and uncover how to utilise the WrapRows function, leveraging the latest Excel functions. You’ll become familiar with practical shortcuts and commands to simplify your data management process and elevate your Excel skills.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; ChatGPT ; Artificial intelligence ; Electronic spreadsheets Computer programs ; Business Computer programs ; Intelligence artificielle ; Tableurs ; Logiciels ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores how ChatGPT can be used to generate formulas. It emphasises practicality by applying the generated formula to a real-world scenario. It’ll show the balance of human expertise and AI assistance. We’ll demonstrate using ChatGPT to create an XLOOKUP formula. We’ll guide you through constructing a prompt tailored to your dataset. We’ll acknowledge ChatGPT’s usefulness while underlining that optimal results come from having an understanding of Excel and being able to spot errors.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson is a guide to building a habit tracker using Excel. You can add checkboxes for each day of the week, allowing you to visually mark off completed daily habits and receive a percentage update. Whether you want to track your fitness routine, study habits, or any other daily activities, this tutorial is customisable to suit your needs. Learn essential tips, such as hiding unnecessary information for a clean look and using formulas to calculate the percentage of completed tasks for the week. By the end of this lesson, you'll have a functional Daily Habit Tracker – ideal for supercharging your productivity – that you can adapt to monitor your progress.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: While VLOOKUP may seem like old news, it remains a powerhouse in data analysis. This lesson focuses on the often misunderstood approximate match argument. You'll learn the details of VLOOKUP, tackling lookup values, table arrays, column indices, and the pivotal choice between an exact match and an approximate match. This lesson equips you with the skills to use VLOOKUP effectively, making your data work for you.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885628 , 1835885624
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Python (Computer program language) ; Intelligence artificielle ; Python (Langage de programmation) ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative learning experience with 'Master ChatGPT and OpenAI APIs By Building AI Tools in Python.' This immersive course takes you from the basics of ChatGPT and OpenAI's potent APIs through a journey of building dynamic AI-powered tools. Discover the magic behind ChatGPT's conversational prowess and dive deep into the neural networks and transformers that make it tick. You'll start by creating and managing your ChatGPT account, understanding the model's anatomy, and grasping the limitations and capabilities of AI language models. Transitioning from theory to hands-on practice, the course guides you through content creation, code generation, and the intricacies of prompt engineering. Moreover, you'll venture into the realms of generative AI with Midjourney, craft AI-driven applications, and harness the synergy of OpenAI and DALL-E for on-the-fly image generation. This course demystifies the AI concepts crucial in today's technology landscape, providing you with the skills to innovate and excel in the burgeoning field of AI. What you will learn Navigate the foundational elements of ChatGPT and OpenAI APIs Generate creative content and code with ChatGPT's language model Design and implement AI applications with user-friendly interfaces Master the art of prompt engineering for optimized AI interactions Build AI-powered tools and images using OpenAI and DALL-E Develop secure, intelligent applications with advanced Python techniques Audience This course welcomes everyone from entrepreneurs to artists and developers, aiming to learn about cutting-edge AI technologies and build AI-powered applications. Basic programming knowledge is preferred but not mandatory, making this course accessible to a wide range of learners. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888148 , 1835888143
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Service-oriented architecture (Computer science) ; Architecture logicielle ; Architecture orientée service (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Docker, the pivotal tool in container technology, with our Docker Mastery course. Designed for beginners, this course guides you through the essentials of Docker, explaining its importance and how it revolutionizes deployment processes. Starting with an introduction to Docker and its ecosystem, you'll understand why Docker is a game-changer in software development and deployment. You'll set up your development environment, master Docker fundamentals through hands-on exercises, and learn to manage containers efficiently. The course progresses to more complex topics like Dockerfile, image publishing, Docker layers, caching, and Docker Compose for multi-tier applications. With a special focus on CI/CD using Docker, GitHub Actions, and AWS Elastic Beanstalk, you'll gain the skills to automate your deployment workflows, ensuring faster and more reliable releases. By the end, you'll have a solid foundation in Docker, ready to tackle real-world challenges and streamline your development pipeline. What you will learn Setup and manage your Docker development environment Run, stop, and manage containers and images efficiently Optimize Dockerfile for effective image creation and management Publish Docker images and explore Docker layers and caching Develop CI/CD pipelines with Docker, GitHub Actions, and AWS Deploy complex web applications using Docker Compose Audience This course targets aspiring DevOps professionals, software developers, system administrators, IT managers, QA engineers, and technology enthusiasts. Ideal for those aiming to refine development workflows, enhance application portability, and ensure project consistency using Docker. It's perfect for individuals responsible for efficient app deployment, scaling, and management, as well as QA professionals looking to improve testing accuracy. No Docker experience required; some programming knowledge preferred but not essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Language: English
    Pages: 1 online resource (1 video file (54 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join Michael Lopp and Tara Hernandez as they delve into developer productivity--what it is, why it's often misunderstood, and why it's such a hot topic right now. This event is for aspiring and active leaders who want to ensure that their teams are meeting their goals, have the tools they need to do their best work, and are able to communicate the value of their work to non-technical leadership. Viewers will gain insight into recent debates about measuring developer productivity, what qualitative and quantitative data shed the greatest light on productivity, and what steps they can take to foster an organizational culture that looks holistically at developer experience. Tech Leadership Tuesday is a dynamic monthly live event that helps empower people and technology leaders to become more effective and successful in their leadership roles. Each episode delves into a relevant topic for engineering leaders and, through a conversation between a host and guest, you'll learn about common challenges, best practices, and lessons learned from the guest's experience. What you'll learn and how you can apply it What's driving recent debates about developer productivity The role that developer productivity plays in engineering culture The business value of focusing on developer productivity and how you can measure ROI This live course is for you because... You want the chance to hear from Michael Lopp and Tara Hernandez about leadership and developer productivity. You're a leader and you want to learn to think more holistically about how to empower developers and deliver software faster. Recommended follow-up: Read Rethinking Productivity in Software Engineering (book) Read Efficiency vs. Effectiveness vs. Productivity (Chapter 2 from Leading Effective Engineering Teams) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835460429 , 1835460429
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your 3D modeling journey with Blender, starting from the basics of setting up projects and creating grey boxes to organizing work with collections. Learn the intricacies of seams, sharps, and UV mapping, essential for effective texturing. The course progresses to scene optimization and asset management, followed by an exploration of materials, shaders, and advanced mesh editing techniques, including proportional editing and the use of Booleans. Dive deeper into refining skills with texturing, structural elements, and the art of adding Viking details. Transition your creations to Unreal Engine 5, where you'll set up scenes, integrate assets, and apply advanced materials for realistic environments. This course, designed for beginners ready to advance their skills, combines detailed instruction with project-based learning, preparing you for a career in 3D modeling and game development. From Blender's fundamentals to UE5's dynamic environment, unlock your creative potential and bring your digital worlds to life. What you will learn Utilize UV mapping for texture perfection Optimize 3D scenes for efficiency Craft materials and unique shaders Employ advanced mesh editing techniques Transition assets from Blender to UE5 Finalize scenes with professional lighting Audience This course is ideal for aspiring 3D artists and game developers with a keen interest in environment design. No prior experience is needed, making it perfect for beginners ready to dive into the world of 3D modeling and scene creation. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835466124 , 1835466125
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking ; Tests d'intrusion ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. It covers techniques such as Web App Enumeration, HTTPS analysis with Wireshark and Burp Suite, and POP3 Enumeration, setting the stage for deeper exploration into cybersecurity defenses. The course focuses on practical application, moving from theoretical concepts to real-world hacking techniques. Learners will navigate through gaining access, exploiting systems, and executing privilege escalations both horizontally and vertically. Scenarios involving systems like GoldenEye, Bob, and Straylight offer hands-on experience, emphasizing the attacker's perspective to fortify defense mechanisms. The course wraps up with advanced topics in exploit development and real-world applications, challenging learners to apply their knowledge in complex environments. From scanning and enumeration to gaining access and privilege escalation, learners will develop a solid foundation in hacking techniques and cybersecurity defense. This course not only equips technical professionals with essential skills but also empowers them to think like a hacker, a vital perspective in today's digital world. What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Ever found yourself grappling with the challenge of counting or summing cells based on their background fill color in Microsoft Excel? Look no further! In this lesson, we unravel the mysteries without delving into complex VBA code. We understand that not everyone is VBA-savvy, so we've devised a straightforward method using the SUBTOTAL function. Follow along as we demonstrate how to COUNT and SUM cells with specific background colours using Excel filters. Whether you're identifying students who need to retake a test or analysing sales figures, our step-by-step guide ensures you harness the power of SUBTOTAL with ease. No need to fear the gremlins of VBA—this is the simplest method to achieve quick results and gain insights into your data.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you're a Microsoft 365 user or use Excel for the web, this lesson is for you – the IMAGE function is exclusive to these versions. We explore the application of the IMAGE function to import company logos into your spreadsheet. Use the IMAGE function to dynamically fetch company logos using URLs. Learn how to concatenate cell references, incorporate website URLs, and enhance your spreadsheet with this function. This lesson shares how to leverage the IMAGE function's capabilities, so watch, learn, and elevate your Excel game.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets ; Business Computer programs ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Have you ever needed to quickly find data based on two distinct conditions? This one’s for you. Get the most out of Excel's XLOOKUP function and learn about two-way lookups with multiple criteria. We’ll introduce a scenario involving sales data spread across months, showing how XLOOKUP handles a two-way lookup. We’ll examine named ranges and data validation dropdowns too. We’ll use practical examples to support your learning and enhance your spreadsheet proficiency. Finding the data you need doesn’t have to be a challenge.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883440 , 1835883443
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. What you will learn Secure passwords with best practices Conduct safe data disposal protocols Navigate networks with safety measures Identify various forms of malicious software Apply defenses against software threats Adopt proactive cyber hygiene habits Audience This course is ideal for individuals looking to bolster their digital security acumen. Tailored for users who wish to protect their online presence against evolving cybersecurity threats. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (43 min.)) , sound, color.
    Edition: [First edition].
    DDC: 650.1
    Keywords: Success in business ; Leadership ; Time management ; Project management ; Succès dans les affaires ; Leadership ; Gestion du temps ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Advancing in a large organization requires more than just being good at your job. Many of these skills and practices are not obvious and seldom taught. In teaching some of these practices, this course will help you learn how to better manage your time and relationships, find space to innovate, and take advantage of all the perks and benefits of working at a large company, so that you can not only survive but also thrive in your role. What you'll learn and how to apply it By the end of this course, you will have new tools and ways of thinking that will improve your daily outlook, give you more opportunities to advance, and avoid overwork at a large organization. This course is for you because You're new to working at a large company and want some tactics and practices to avoid making mistakes and having an unpleasant worklife. You want to become better at managing relationships and using your time wisely. You want to work on advancing your career and effectiveness at work. Prerequisites You're working in a large company Your job is focused on how the organization runs, either by helping management, being a manager, or aspiring to one of those roles.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Explore advanced data validation techniques, features and Excel's data validation capabilities in this lesson. While dropdown lists are commonly used to control data entry, in this lesson we will demonstrate how to integrate input messages and error alerts. Learn how to provide helpful hints with custom input messages, guiding users on what to select from the dropdown list. Moreover, master the art of error alerts that warn against invalid inputs, ensuring data integrity and preventing mistakes. Whether you're managing a team-shared spreadsheet or simply want to elevate your data validation skills, this lesson unlocks the full potential of Excel's capabilities, making your spreadsheets more user-friendly and error-resistant.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson shares essential tips and tricks for effectively managing large datasets, focusing specifically on printing. Whether you're dealing with extensive tables or spreadsheets, printing can sometimes pose challenges, and we're here to guide you through the process. We’ll establish how to adjust print settings and change from portrait to landscape to accommodate more columns on a page. Additionally, we'll uncover a handy trick to ensure that column headings are consistently printed on every page. We'll also address what to do when you only need to print a specific subset of your dataset. We'll cover methods like setting print areas and selecting particular rows to print. Join us to master the art of printing large datasets to make your data more accessible and visually appealing.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores a variety of keyboard shortcuts grouped into categories like navigation, selection, and command execution. Whether you're a beginner or an experienced user, these shortcuts are sure to become valuable tools in your Excel toolbox. Discover time-saving navigation tricks, selection shortcuts, and ribbon commands with keyboard shortcuts. Uncover the power of the Alt key, which provides quick access to ribbons and their commands, enhancing your ability to navigate easily and execute tasks without frustration. These keyboard shortcuts are not just about speed but are designed to streamline your workflow. Boost your Excel skills with the magic of keyboard shortcuts!
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Querying (Computer science) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Bases de données ; Interrogation ; Tableurs ; Logiciels ; online searching ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores how to merge multiple files housed in a designated folder using Power Query. We’ll guide you through the process of transforming and loading the data back into Excel, ensuring a streamlined approach for future updates. This lesson emphasises the significance of consistent column headings and table names across files, making the combination process in Power Query a breeze. As a bonus, explore how to update your consolidated data with new information using the refresh feature. Efficiently manage and integrate data sets for improved analysis and reporting.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881248 , 1835881246
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Web applications Security measures ; Tests d'intrusion ; Applications Web ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the foundational elements of web application infrastructure, introducing you to the critical aspects of URLs, HTTP Methods, and the underlying technologies that make the internet tick. You will gain a firm grasp on the workings of Web APIs, Content Management Systems, and Databases, setting the stage for more advanced topics. The course focuses on equipping you with the skills to identify, analyze, and exploit vulnerabilities within web applications. From exploring the use of powerful tools like Burp Suite and OWASP ZAP to understanding the intricacies of SQL Injection, XSS attacks, and CSRF (Cross-Site Request Forgery), you will journey through a curriculum designed to challenge and enhance their hacking capabilities. The course wraps up by delving into complex security issues such as JWT Attacks, IDOR, and SSRF, ensuring you emerge with a well-rounded mastery of web app pentesting. Throughout, the emphasis is on hands-on learning, providing you with the opportunity to apply concepts in real-world scenarios, thereby cementing your understanding and preparing you for professional success. What you will learn Conduct vulnerability scans with Nikto and Burp Suite Execute directory fuzzing with Feroxbuster Detect and exploit SQL injections using SQL Map Uncover and mitigate XSS vulnerabilities Safeguard against CSRF and SSRF threats Implement JWT attack strategies for security Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and aspiring ethical hackers seeking to deepen their understanding of web app vulnerabilities. Familiarity with basic security concepts and experience with web technologies are recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Artificial intelligence promises to augment human capabilities, revolutionize scientific research, personalize consumer experiences, transform education, and usher in an era of autonomous transportation. But companies should understand the risks along with the potential. Implementing AI without clear use cases or business goals can lead to wasted resources, and a lack of expertise or attention to ethical considerations can bring powerful consequences. Join our experts to explore how AI is changing technology and business. You'll learn how to harness its transformative potential while avoiding common missteps and discover how to best use AI as a tool for progress rather than a stumbling block. What you'll learn and how you can apply it Apply AI in the right situations and avoid costly mistakes by expecting too much from a developing tech Program macros and scripts with no coding experience using ChatGPT Discover the progress being made with autonomous vehicles and the pitfalls they face This Superstream recording is for you because... You're an ML engineer or developer interested in safely and effectively taking advantage of recent advances in AI while avoiding potential pitfalls. You want to hear about the latest and greatest of AI from experienced industry experts working in the field today. Your organization is quickly advancing into applying AI without a strong map for the potential peaks and valleys ahead. Recommended follow-up: Read Designing Machine Learning Systems (book) Watch Building AI Agents with LLMs (video) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781801078047 , 1801078041
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the foundational concepts of working with variables and basic scripting, setting the stage for more advanced scripting techniques. It delves into the intricacies of the Linux operating system, including the X11 and Xorg configuration. As the course progresses, it covers critical administrative tasks such as managing user accounts, groups, system accounts, and scheduling tasks with cron and systemd. The importance of localizing Linux, managing system time, and configuring network time protocol (NTP) servers and clients is highlighted. The course focuses on essential system management topics, including system logging with rsyslog and journald, configuring mail transfer agents, and managing printers. Networking fundamentals are explored, from understanding TCP/IP to configuring network adapters and troubleshooting network issues. Security is a key theme, with topics on auditing permissions, managing root access with sudo, exploring networks, hardening Linux, and configuring SSH and GPG for secure communications. The course wraps up by offering insights into tunneling traffic with SSH, providing students with a comprehensive skill set for securing and managing Linux systems effectively. What you will learn Manage Linux user accounts and groups efficiently Schedule tasks using cron and systemd Configure and troubleshoot Xorg and remote X servers Secure Linux systems and manage root access Configure network settings and troubleshoot networking issues Encrypt data and communications with GPG Audience This course is ideal for aspiring and current IT professionals seeking to deepen their expertise in Linux administration. Ideal for those aiming to pass the LPIC-1 (102-500) certification exam. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886267 , 1835886264
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. From the outset, learners are immersed in the Blender Basics Overview, accompanied by a rich Resource Pack, to swiftly get up to speed with the software's capabilities. Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. The course continues through the nuances of creating detailed 3D environments, leveraging greyboxing techniques, and applying lifelike textures and materials to bring scenes to life. Special emphasis is placed on generating creative references using AI, crafting natural elements with geometry nodes, and designing intricate architectural features that stand out in any portfolio. As the course progresses, learners delve into advanced modeling, lighting, and the art of texture application, culminating in a segment dedicated to rendering techniques that showcase their projects in the best light. By the end, participants are not just proficient in Blender; they are equipped with a holistic view of 3D design, enabling them to bring their creative visions to fruition. What you will learn Navigate Blender's interface and tools Create efficient asset management workflows Design 3D environments with advanced greyboxing Apply textures and materials for realism Construct architectural elements in Blender Model and texture dynamic 3D foliage Audience This course is ideal for 3D artists, designers, and enthusiasts looking to enhance their Blender skills. Prior basic knowledge of 3D concepts is helpful but not required. This course is perfect for those seeking to create professional 3D models and environments. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138177652 , 0138177651
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 24 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Deep learning (Machine learning) ; Machine learning ; Apprentissage profond ; Apprentissage automatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884461 , 1835884466
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; COBIT (Information technology management standard) ; Technologie de l'information ; Gestion ; COBIT (Norme) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to COBIT 19, setting the stage for a comprehensive exploration of enterprise governance of information and technology. It delves into the significant benefits I&T governance brings to the table, emphasizing the importance of aligning IT processes with business goals. The course focuses on detailing what COBIT is and importantly, what it is not, establishing a clear understanding of its scope and application. Through an examination of COBIT's six principles for a governance system and its three framework principles, learners gain insights into the enhancements introduced in COBIT 2019. The course wraps up by guiding learners through the governance and management objectives, the components of the governance system, and the impactful design factors, alongside providing practical insights into the COBIT implementation guide approach. Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. What you will learn Understand enterprise governance of IT Navigate COBIT 2019 enhancements Identify governance and management objectives Apply COBIT in various IT scenarios Achieve COBIT certification readiness Plan for continual IT governance improvement Audience This course is ideal for IT professionals, auditors, and managers aiming to bolster their organization's IT governance. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885925 , 1835885926
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Artificial intelligence ; Computer programming ; Chatbots ; Application program interfaces (Computer software) ; Python (Computer program language) ; Intelligence artificielle ; Programmation (Informatique) ; Interfaces de programmation d'applications ; Python (Langage de programmation) ; artificial intelligence ; computer programming ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive masterclass takes you on a transformative journey into the realm of LangChain and Large Language Models, equipping you with the skills to build autonomous AI tools. Starting with the basics, you'll set up your development environment, including OpenAI API and Python, and progress to advanced topics like LangChain's architecture, prompt templates, and parsers. The course meticulously guides you through creating complex chains, memory models, and agents, culminating in the development of practical applications such as PDF extractors, newsletter generators, and multi-document chatbots. With hands-on tutorials, you'll learn to leverage LangChain for tasks ranging from document loading and splitting to embedding vector stores for semantic similarity searches. By the end, you'll have the knowledge to implement AI in creative and impactful ways, from image-to-text conversion to building interactive chatbots and more, all while navigating the ethical considerations of AI deployment. What you will learn Configure OpenAI API and Python for AI development Create and manipulate LangChain prompt templates and parsers Implement LangChain memory models and chains for complex AI applications Develop real-world applications, including newsletter generators and chatbots Work with LangChain embeddings and vector stores for semantic searches Navigate the ethical and copyright implications of AI-generated content Audience This course is designed for a broad audience interested in artificial intelligence, from data scientists enhancing projects with AI and LangChain, to product managers boosting user experience with AI features. AI enthusiasts, tech innovators, and programmers will deepen their understanding of LangChain, unlocking new opportunities in AI-driven development and pioneering next-gen solutions. While specific knowledge of Python is not necessary, familiarity with programming concepts is essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885703 , 1835885705
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the fundamentals of penetration testing, distinguishing the roles of pentesters - the good, the essential, and the challenges they face. It lays the groundwork with pre-engagement essentials, including data security agreements and crafting a detailed Statement of Work (SOW), ensuring clarity and legal safeguarding before any testing begins. The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. It emphasizes the importance of maintaining access, covering tracks, and preparing comprehensive deliverables to ensure actionable insights for enhancing security. The course wraps up by exploring personal engagement toolkits and pentesting platforms, providing practical knowledge for effective pentesting. It also touches upon blue team pentesting, highlighting the collaborative effort required in cybersecurity to protect against threats. What you will learn Plan and execute effective penetration tests Perform detailed reconnaissance and vulnerability scans Exploit vulnerabilities to assess security posture Maintain unauthorized access discreetly Execute strategies to conceal testing activities Produce comprehensive security assessment reports Audience This course is ideal for IT professionals, cybersecurity enthusiasts, and ethical hackers seeking to enhance their pentesting skills. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Brad Stine: Brad Stine is the Chief Information Security Officer at Semper Sec with years of experience in security architecture. Throughout his career, Brad has played a key role in the development and delivery of technology-driven business solutions, including projects centered around cloud transformation, CI pipeline automation, and identity access management. Brad is highly skilled in Analytics, Incident Management, Vulnerability Management, ISO 27001:2013, and Enterprise Architecture. He has an extremely knowledgeable computer science background and holds a CISSP certification.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover a unique option that adds a touch of magic to your charts. Picture a pearl chart created by stacking colourful circles representing data points. No matter what you need to create one for, the possibilities are endless. Learn how to format your chart, add custom elements like coloured circles, and add the stacking feature. With practical insights and useful tips, you'll witness how easy adjustments can turn a simple chart into an engaging visual representation.
    Note: Online r esource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Using the AND function within the conditional formatting rule, we demonstrate how to highlight specific rows where two conditions must be met simultaneously. We’ll explain how to create a more tailored and responsive spreadsheet. You'll learn step-by-step how to adapt the existing conditional formatting rule. Seamlessly integrate multiple criteria using the AND function, providing flexibility in highlighting rows based on intricate conditions. Whether you're managing sales data or any other dataset with dual conditions, this lesson equips you with the skills to efficiently implement conditional formatting that adapts to changing parameters.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson will support you in performing complex two-way lookups with ease. We’ll explore the mechanics of the two-way lookup using the combination of INDEX and MATCH functions. The INDEX function will help us retrieve the sales value from the specified array, while the MATCH function will allow us to find the positions of the selected company and month within their respective lists. Combining these functions makes our formula flexible enough to handle various combinations, ensuring accurate and efficient data retrieval.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Electronic spreadsheets ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A standard VLOOKUP has its limitations. XLOOKUP offers additional search options but fails to provide the desired result. This lesson presents a familiar scenario involving a table with employee names, departments, and countries of residence, showcasing the complexity of traditional lookup functions when faced with duplicates. By combining multiple pieces of information, such as employee names and departments, we create a unique identifier for each record. Using this approach with XLOOKUP, we successfully achieve accurate lookups - highlighting the importance of finding unique identifiers when dealing with duplicate values in your data sets. Join us in mastering this essential skill for effective data management! Learning Objectives Perform accurate lookups in tables with duplicate values by creating unique identifiers - ensuring precision in data retrieval and management.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...