Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2015-2019  (9)
  • 1970-1974
  • Safari, an O’Reilly Media Company  (6)
  • Givre, Charles  (3)
  • Laade, Wolfgang
  • World Bank
  • Internet videos  (9)
Datasource
Material
Language
Years
  • 2015-2019  (9)
  • 1970-1974
Year
Author, Corporation
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135305331 , 0135305330
    Language: English
    Pages: 1 online resource (1 video file, approximately 34 hr., 4 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 21+ Hours of Video Instruction Overview CompTIA A+ Core 1 (220-1001) Complete Video Course is a unique video product that provides a solid understanding of A+ skills. The purpose of these videos is to act as quick, concise, hands-on training that is easily absorbed. In this best-selling author and instructor-led course you will get coverage of every objective and topic in the CompTIA A+ Core 1 (220-1001) exam. It is also full of hands-on demos so you can see real hardware and software presentations. David Prowse walks you through the details you need to not only pass the test, but troubleshoot and fix real hardware, software, and network problems for your career. The author also includes Tech Tips throughout to give you insider info on troubleshooting, repair, and maintenance. This title can be used as your sole resource for learning the material needed to study for and pass the test. You can also use this as a supplement to other A+ training. Five domains map to the main objectives of the CompTIA A+ Core 1 (220-1001) exam. These domains contain 37 lessons with video totaling more than 21 hours of hands-on demonstrations, audio instruction, animations, whiteboard training, and video screencasting. The videos also include the author building a computer live on camera so you can see first-hand how to accomplish this key task. He also includes hands-on configuration labs; laptop, smartphone, and device hardware labs; and live-action troubleshooting labs. The 37 video lessons are broken down into five domains and cover the following topics: Mobile Devices Networking Hardware Virtualization and Cloud Computing Hardware and Network Troubleshooting Topics include Domain 1: Mobile Devices Domain 2: Networking Domain 3: Hardware Domain 4: Virtualization and Cloud Computing Domain 5: Hardware and Network Troubleshooting Skill Level Beginner You Will Learn All the objectives in the CompTIA A+ Core 1 (220-1001) exam Test-taking techniques with interactive practice quizzes, performance-based simulations, and hands-on exercises How to build a computer, perform networking tasks, configure laptops and mobile devices, and perform troubleshooting ta...
    Note: Online resource; Title from title screen (viewed June 24, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 52 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Wow! A brand new set of techniques to study and apply. The videos are great, amazingly organized, and go step by step to introduce such a complex topic. Arnaldo Ayala, Software Architect, Consultores Informáticos The Keras package for R brings the power of deep learning to R users. Deep Learning with R in Motion locks in the essentials of deep learning and teaches you the techniques you'll need to start building and using your own neural networks for text and image processing. Instructor Rick Scavetta takes you through a hands-on ride through the powerful Keras package, a TensorFlow API. You'll start by digging into case studies for how and where to use deep learning. Then, you'll master the essential components of a deep learning neural network as you work hands-on through your first examples. You'll continue by exploring dense and recurrent neural networks, convolutional and generative networks, and how they all work together. And that's just the beginning! You'll go steadily deeper, making your network more robust and efficient. As your work through each module, you'll train your network and pick up the best practices used by experts like expert instructor Rick Scavetta, Keras library creator and author of Deep Learning in Python François Chollet , and JJ Allaire , founder of RStudio, creator of the R bindings for Keras, and coauthor of Deep Learning in R ! You'll beef up your skills as you practice with R-based applications in computer vision, natural-language processing, and generative models, ready for the real-world. Machine learning has made remarkable progress in recent years. Deep learning systems have revolutionized image recognition, natural-language processing, and other applications for identifying complex patterns in data. The Keras library provides data scientists and developers working in R a state-of-the-art toolset for tackling deep learning tasks! Inside: The 4 steps of Deep Learning Using R with Keras and TensorFlow Working with the Universal Workflow Computer vision with R Recurrent neural networks Everyday best practices Generative deep learning You'll need intermediate R programming skills. No previous experience with machine learning or deep learning is assumed. Rick Scavetta is a biologist, workshop trainer, freelance data scientist, cofounder of Science Craft, and founder of Scavetta Academy, companies dedicated to helping scientists better understand and visualize their data. Rick's practical, hands-on exposur...
    Note: Online resource; Title from title screen (viewed August 28, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780135971673 , 0135971675
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 32 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 6+ Hours of Video Instruction More than 6 hours of video instruction to help you manage your organization’s Windows 10 desktops and prepare for Exam MD-101 Managing Modern Desktops; one of the exams required to achieve Microsoft 365 Certified: Modern Desktop Administrator Associate. Overview This engaging, self-paced instructional video course demonstrates how to deploy and update operating systems, manage policies and profiles, protect devices, and manage apps and data. If you’re planning to take Exam MD-101 Managing Modern Desktops, this video course covers the exam objective domains published by Microsoft in a logical way for learning the technology and preparing for the exam. Throughout each lesson, Microsoft certified trainer and technical author Andrew Warren describes key concepts and puts them into action with demonstrations and real-world scenarios. About the Instructor Andrew Warren has more than 30 years of experience in the IT industry, many of which he has spent teaching and writing. He is a Microsoft Certified Trainer and has been involved as a subject matter expert in many of the Windows Server 2016 courses and as the technical lead in many Windows 10 courses. He also has been involved in developing TechNet sessions about Microsoft Exchange Server. He is the co-author of Exam Ref MD-100 Windows 10 , Exam Ref MD-101 Managing Modern Desktops , Exam Ref 70-741 Networking with Windows Server 2016 , and Exam Ref 70-742 Identity with Windows Server 2016 published by Microsoft Press. Andrew is based in the United Kingdom and lives in rural Somerset where he runs his own IT training and education consultancy. Skill Level Intermediate Learn How To Deploy and update operating systems Manage policies and profiles Manage and protect devices Manage apps and data Who Should Take This Course IT professionals who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment IT professionals who manage identity, access, policies, updates, and apps IT professionals who want to explore new and updated features in Windows 10 Candidates preparing for Exam MD-101 Managing Modern Desktops Course Requirements Experience deploying, configuring, and maintaining Windows 10 and non-Windows devices Familiarity with M365 workloads
    Note: Online resource; Title from title screen (viewed October 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135229415 , 0135229413
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 31 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Six and a half Hours of Video Instruction More than six hours of video instruction covering the knowledge necessary to pass the AWS Solutions Architect Associate certification exam, including an in-depth review of AWS architecture principles and best practices, and technical details pertaining to the implementation of services in accordance with the Well Architected Framework as published by Amazon Web Services. The AWS Certified Solutions Architect Associate Complete Video Course was developed specifically for the latest edition of the exam released in February of 2018. The AWS Solutions Architect Associate certification is ideal for anyone in a solutions architect or similar technical role, and this course is designed to help you pass the AWS Certified Solutions Architect Associate exam. We will cover all the key areas addressed in the exam and review a number of use cases designed to help you ingrain the principles and practices on which this certification is based so that you have an intellectual framework with which to formulate the correct answers. We will use a combination of demonstrations, architectural diagram walkthroughs, and case studies to help you understand the tools available to you for passing the exam. Throughout this course you will gain a deeper understanding of AWS architecture following the five pillars of the Well-architected framework. Demonstrations of Amazon Web Services and third-party cloud solutions are included to provide a clear guide to understanding the services offered by Amazon Web Services and the needs those services meet. Quizzes are also offered to help viewers gauge their ability to understand and retain the information presented. Topics include: Lesson 1: Solutions Architect Associate Certification Lesson 2: High Availability Lesson 3: Network Topology Lesson 4: Application Design Lesson 5: Network Performance Lesson 6: Compute Performance Lesson 7: Storage Performance Lesson 8: Database Performance Lesson 9: Leveraging Managed Services Lesson 10: Identity and Access Management Lesson 11: Detection Lesson 12: Securing Infrastructure Lesson 13: Securing Data Lesson 14: Cost Optimization Lesson 15: Operational Excellence About the Instructor Richard A. Jones is a certified AWS Solution Architect and an experienced instructor having taught the IT teams of numerous Fortune 500s and postgraduate students at the University of Colorado. Programming since age 10, Richard has spent more than 25 years furthering...
    Note: Online resource; Title from title screen (viewed July 6, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    ISBN: 9781492032410 , 1492032417
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Machine learning ; Computer security ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. This video course introduces you to machine learning and explains the concept at the core of machine learning, models, and how you "train" them to perform tasks and solve problems. This video course focuses specifically on "supervised" training, or learning, in a security context. Your host, cyber security specialist and data scientist Charles Givre, provides examples and use cases that use real security data and focus on actual applications of machine learning to security problems rather than contrived or superficial datasets. You will see how to build supervised machine learning models, evaluate and optimize their performance, and then apply these models in a security context. You will examine the theory and implementation behind the supervised machine learning techniques most relevant to security, including random forest, support vector machines, and more. This video course is one in a set of three individual ones intended for security professionals who want to learn how to use and apply data science to their toughest security problems. Mr. Givre focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it What machine learning is and how it can be useful, particularly in a security setting How to build classification models using techniques, such as support vector machines and random forest, and use them in a security context How to measure the performance of supervised machine learning models by developing metrics and through visualization How to fine-tune your model to get the best possible performance How to apply supervised machine learning techniques in a security setting using security related datasets This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: Students are encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) Students should have access to a computer with at least 8 GB of RAM and 20 to 30 GB of hard drive space.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    ISBN: 9781492032335 , 1492032336
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 54 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Machine learning ; Computer security ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe and detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. If you're a security engineer, network analyst, or anyone else charged with protecting your organization's valuable IT system and data, this video will show you how to quickly and efficiently ingest a variety of data types typically used in security settings and prepare them for analysis in the Python data science ecosystem. Your host, cyber security specialist and data scientist Charles Givre, teaches the concepts behind vectorized computing as it applies specifically to security. Gathering and preparing data is one of the biggest challenges facing anyone who is seeking to do advanced analysis and machine learning. This video will help you learn how to use the Pandas ecosystem to quickly and effectively gather, prepare, and explore security data for advanced analysis and machine learning. This video is one in a set of three, intended for security professionals who want to learn how to use and apply data science to their toughest security problems. It focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it How to use Pandas for security data preparation How to ingest, manipulate, and summarize multidimensional data How to quickly extract, transform, and load (ETL) security data from a variety of sources into the Pandas ecosystem, extract features, and prepare the data for machine learning This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: You're encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) You should have access to a computer with at least 8 GB RAM and 20 to 30 GB of available hard drive space.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    ISBN: 9781492032373 , 1492032379
    Language: English
    Pages: 1 online resource (1 video file (55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Machine learning ; Computer security ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. This video course introduces you to the concept "unsupervised" model training, or learning, in a security context. Your host, cyber security specialist and data scientist Charles Givre, explains the theory behind commonly used clustering algorithms such as K-means and DBSCAN as well as the direct application to security problems such as anomaly detection. You'll see how to pipeline your models into a production environment using the Python scikit-learning library. You'll also learn how to calculate metrics to assess your models' performance, and how to use Yellowbrick to create visualizations of those performance evaluations. This video course is one in a set of three individual ones intended for security professionals who want to learn how to use and apply data science to their toughest security problems. Mr. Givre focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it The mechanics of several commonly used clustering algorithms such as K-means and DBSCAN How to reduce the dimensions of large datasets using Principal Component Analysis Understanding how to evaluate the performance of unsupervised techniques when possible Using Yellowbrick to produce visualizations of performance evaluations Applying unsupervised learning techniques to security problems such as detecting anomalies This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: Students are encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) Students should have access to a computer with at least 8 GB of RAM and 20 to 30 GB of hard drive space.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780134540238 , 0134540239
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 24 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: The supplemental video for the product CCENT/CCNA ICND1 100-105 Official Cert Guide
    Note: Online resource; Title from title screen (viewed April 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780134540221 , 0134540220
    Language: English
    Pages: 1 online resource (1 video file, approximately 55 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: The supplemental video for the product CCNA Routing and Switching ICND2 200-105 Official Cert Guide
    Note: Online resource; Title from title screen (viewed April 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...