Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2020-2024  (2,181)
  • 2010-2014  (165)
  • World Bank Group  (1,774)
  • Packt Publishing,  (456)
  • Guth, Karl-Maria
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835464694 , 1835464696
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Software architecture ; Python (Computer program language) ; Interfaces de programmation d'applications ; Architecture logicielle ; Python (Langage de programmation) ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers a detailed exploration of FastAPI, a cutting-edge Python framework for API development. The course starts with basic API and REST principles, quickly advancing to practical application for a thorough understanding of both theory and practice. The curriculum progresses logically, starting with the basics of FastAPI, including app setup, API routing, linting, and formatting. Participants will create a social media API, manage post and comments, and learn code organization with APIRouter, followed by practical testing experience using pytest. A significant portion of the course focuses on asynchronous databases, vital for scalable application development. It covers database setup, connection, and integration within FastAPI. The course also delves into Python logging techniques, crucial for debugging and monitoring FastAPI applications. It also covers user authentication, an essential element in modern web apps. It includes practical training on JWTs, password hashing, authentication management, and database user relationships, alongside addressing many-to-many database relationships and user email confirmation strategies. In later stages, the course addresses advanced topics like file uploads, background image generation tasks, and deployment methodologies, including continuous integration with GitHub Actions. What you will learn Build and structure a FastAPI application Implement and test RESTful APIs with FastAPI Manage asynchronous database operations Configure and utilize Python logging in FastAPI Secure applications with user authentication and JWTs Handle complex database relationships Deploy FastAPI applications and manage them effectively Audience This course is ideal for aspiring back-end developers, testers looking to integrate automation into their workflows, and front-end developers seeking a deeper understanding of server-side processes. This course will particularly benefit those with a basic grasp of programming and a desire to specialize in the fast-paced realm of web development, API construction, and database management using FastAPI. Prior programming experience in any language is recommended; beginners should consider a basic Python course first, as all required software is provided for free. About the Author Jose Salvatierra Fuentes: Jose, a passionate educator in the realm of coding and software development, has dedicated over 7 years to teaching online. He founded Teclado with a vision to democratize software development education, striving to ensure comprehensive understanding for his students. His approach makes learning coding a clear, rewarding journey, connecting the dots that once seemed obscure. Specializing in Python and JavaScript, Jose excels in web and backend development. He's proficient in various libraries and frameworks, including Flask, React, React Native, and AngularJS. His expertise extends to working with UNIX systems, MongoDB, PostgreSQL, and crafting advanced system architectures. Jose's commitment is to make the learning process both efficient and enjoyable, guiding students to mastery in software development.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887288 , 1835887287
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Six sigma (Quality control standard) ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Six Sigma
    Abstract: The course begins with a comprehensive introduction to Lean Six Sigma, laying a solid foundation in process improvement basics and key concepts. You'll explore Lean Six Sigma metrics, core methodologies, and the Seven Tools of Quality, building a strong understanding of process optimization. The course focuses on practical skills and tools, including the DMAIC Model (Define, Measure, Analyze, Improve, Control), important graphs and charts, and real-world applications. You'll learn to identify and eliminate waste, understand customer requirements (CTQs), and optimize processes for better quality and efficiency. As you progress, the course covers advanced topics like process control, root cause analysis, and statistical analysis techniques. You'll gain hands-on experience applying Lean Six Sigma principles to real projects, making data-driven decisions, and achieving tangible improvements. The course wraps up with a review of key concepts and a practical guide to implementing Lean Six Sigma methodologies in your organization. By the end, you'll be well-equipped to earn your Green Belt certification and drive process excellence in any industry. What you will learn Learn Process Improvement with Lean Six Sigma Apply DMAIC methodology for effective problem-solving Utilize the Seven Tools of Quality for defect reduction Understand core Lean Six Sigma concepts and terms Analyze data and identify opportunities for process optimization Implement statistical tools and techniques for quality improvements Audience This course is ideal for professionals seeking to enhance their process improvement skills and earn a Lean Six Sigma Green Belt certification. A basic understanding of business processes is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Cherokee Boose: Cherokee started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886922 , 1835886922
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into Cisco's networking environment, covering foundational concepts such as network component roles and the Cisco CLI. It progresses through network topology, IPv4 and IPv6 addressing, and essential networking principles like virtualization, wireless configurations, and switch functionalities. The course is designed to build a comprehensive understanding of network infrastructure and cybersecurity basics. Focusing on practical applications, you will gain hands-on experience in configuring and managing Cisco networks. The course emphasizes VLAN configuration, Interswitch connectivity, routing protocols, and network security implementations. Through real-world scenarios, you will explore DHCP, NTP, and DNS in network management, alongside configuring static and dynamic routing, understanding ACLs, and navigating network address translation. The course concludes with advanced topics in network management and security. The course also introduces network management automation, SDN architecture, and REST-based APIs application. This course will ensure you are well-equipped for intermediate to advanced roles in network administration and security, with a robust skill set for navigating complex networking environments. What you will learn Understand network component roles and functions Analyze different network topology characteristics Configure IPv4 and IPv6 addresses on devices Gain insights into wireless configuration and security Learn routing components and packet forwarding techniques Implement network security through ACLs and NAT Audience This course is ideal for aspiring network administrators, IT professionals, and students seeking foundational knowledge in networking. This course is perfect for those preparing for the Cisco CCNA (200-301) certification, aiming to acquire a comprehensive understanding of network security, protocols, and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Education Study
    Keywords: Covid-19 Impact ; Current Status Of Education ; Curriculum and Instruction ; Education ; Education and Employment ; Education Finance ; Education Financing ; Education Quality ; Education Resource Allocation ; Education Sector Spending ; Effective Schools and Teachers ; Motivation For Education
    Abstract: The education sector in the Lao PDR (Laos) faces significant challenges. Access to education improved over of the past decade but substantial gaps remain, and previous progress is being undermined by the impacts of COVID-19 and ongoing economic difficulties. The quality of education was already poor before these shocks. The sector is severely underfunded due to a steep decline in public resources allocated to education. In addition, limited job prospects for graduates reduce demand for quality education. To prevent these challenges from causing a lost decade for education in Laos, urgent attention is needed in three areas. First, the government should implement comprehensive economic and fiscal reforms to increase available resources for education and facilitate private sector development to create income earning opportunities for graduates. Second, resource allocation within the sector should be improved for equity and balance. Lastly, the education sector needs to better translate available resources into the learning outcomes of children and youth by reducing inefficiencies and rigidities that constrain the key drivers of learning: teachers, school financing, teaching and learning materials, and school infrastructure. Addressing constraints in these three areas will help reverse the decline in education financing, close access gaps, and enhance service quality
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Ghana assists the World Bank Group (WBG) in better understanding how stakeholders in Ghana perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Ghana on 1) their views regarding the general environment in Ghana; 2) their overall attitudes toward the WBG in Ghana; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Ghana; and 4) their perceptions of the WBG's future role in Ghana
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Kenya assists the World Bank Group (WBG) in better understanding how stakeholders in Kenya perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Kenya on 1) their views regarding the general environment in Kenya; 2) their overall attitudes toward the WBG in Kenya; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Kenya; and 4) their perceptions of the WBG's future role in Kenya
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Economic Growth ; Gender ; Gender and Development ; Gulf Cooperation Council (GCC) ; Macroeconomics and Economic Growth ; Saudi Arabia ; Women ; Women and Labor
    Abstract: The Gulf Cooperation Council (GCC) economies have been a bright spot in an otherwise gloomy economic landscape. Average growthin the GCC surpassed 7 percent in 2022 led by Saudi Arabia, its biggest economy, which was globally the fastest growing large economy. This growth was not just a result of buoyant hydrocarbon prices but also continued growth of non-oil sectors. The latter was the result of persistent structural reforms undertaken by several GCC countries to improve the investment environment, promote flexible labor markets, and encourage women to join the labor market. GCC countries have used the windfall revenues from oil and gas to rebuild their buffers, pay down their debt, and shore-up their sovereign wealth funds. They have also sought to protect their vulnerable populations with continued subsidies on food, fuel, and utilities. Such policies have limited the impact of inflation on the domestic economy. Finally, GCC countries have also used their financial muscle to support economically weaker countries in the region. The stellar growth of 2022 is slowing down and growth is expected to moderate to 1 percent in 2023 before picking up again to 3.6 percent in 2024. The decline in economic activity in 2023 is driven by consecutive production cut decisions by OPEC+ in an effort to stabilize global oil prices. However, non-oil GDP continues its growth trajectory reaching 3.9 percent, resulting weaker integration between oil and non-oil sectors. To maintain this track record, GCC countries will need to continue to exercise prudent macroeconomic management, stay the course with structural reforms, and increase non-oil exports. Downside risks remain and it would be amiss not to mention them. The conflict in the Middle East presents major risks to the region and the GCC outlook if it extends or expands to include other regional players. While it is too early to quantify the impact and channels of the conflict, we already witness a 4 percentsurge in global oil futures. Although China is bouncing back after emerging from tight Covid-19 lockdowns, troubles in the real estate sector could still disrupt this trajectory. Persistent high inflation in the world's major economies has not been entirely vanquishedsuggesting a high interest rate environment for a longer period. Windfall revenues are anticipated as a result of higher oil prices driven by the conflict in the Middle East. However, the extent and duration of the conflict will play a pivotal role in determining economicramifications not only on energy markets but also on regional financial and trade markets and overall economic confidence. The Special Focus section of the report discusses the power of structural reforms and social norms in advancing female labor force participation in Saudi Arabia. Saudi Arabia experienced an unprecedented surge in female labor force participation since 2016 as a result of: (i) changing regulations and the removal of legal barriers, shifting social norms, (ii) the implementation of sound structural reforms and (iii) effective government communications. Saudi Arabia's success in increasing female labor force participation from 17.4 percent in 2017 to 36 percent in 2023 offers important lessons to other countries in the region and the world
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Economic Forecasting ; Economic Growth ; FDI ; Foreign Direct Investment ; FX ; Import Bans ; Improved Welfare ; Inflation ; International Economics and Trade ; Macroeconomics and Economic Growth ; Oil Flows ; Private Sector Credit
    Abstract: Important reform decisions have been taken for Nigeria to avoid a fiscal cliff, and temporary compensation is being provided to help the poorest and most vulnerable households. In May and June 2023, the incoming administration undertook two critical policy decisions, which have resulted in price and exchange rate adjustments in the second half of the year. Targeted cash transfers are helping to cushion the adjustment to higher gasoline prices. On fiscal policy, budget planning for the next several years is consistent with sustaining the fiscal savings from the subsidy reform and mobilizing more revenues. However, the reforms are yet to be completed to fully realize the economic benefits. The FX market has remained volatile and is still in a period of continuing adjustment to the new policy approach. Revenue gains from the FX reform are visible, but more clarity is needed on oil revenues, including the fiscal benefits from the PMS subsidy reform. The economic outlook for Nigeria in the short to medium term hinges on the continuation and effectiveness of its macroeconomic stabilization agenda. Successful implementation of the initiated reforms will be the first step toward improving Nigeria's growth prospect. Moving decisively onto a higher long-term growth and poverty reduction path requires not only a stable macroeconomic environment but also concerted structural reforms
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Adaptation to Climate Change ; Climate Change ; Environment ; Food Security ; Fragile Recovery ; Pollitical Challenges ; Water Resources ; Water Security
    Abstract: Somalia has remained on a strong economic reform path despite the various global and exogenous shocks that have continued to buffet the economy. Recurrent climate-related shocks, such as cycles of droughts, floods, locusts' infestation, higher international commodity prices, as well as increased insecurity and conflict, have interrupted the country's growth trajectory. However, this has not deterred the country's commitment to continue advancing reforms to strengthen key economic institutions and promote macroeconomic stability and recovery. As a result, Somalia has continued to make progress toward meeting the conditions for achieving the heavily indebted poor country (HIPC) completion point in December 2023. Within the framework of resilience, the eighth edition of the World Bank's Somalia economic update series provides an in-depth analysis of recent economic developments and growth outlook and makes a case for integrating climate change with Somalia's growth agenda. This report highlights macroeconomic policies and reforms that promote inclusive growth and institutional building including enhancing fiscal space for development priorities while strengthening expenditure controls; strengthening financial integrity; integrating Somalia into the global financial system; and improving debt management
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Equitable Growth, Finance and Institutions Insight
    Keywords: Finance and Financial Sector Development ; Firm-Level ; Global Statistics ; Public and Municipal Finance ; Public Procurement ; WBES
    Abstract: Public procurement is at the intersection between the public and the private sectors. Policy makers and practitioners are increasingly paying attention to the potential catalytic role of public procurement to promote economic growth and inclusive and sustainable development, for example through participation of SMEs and women-owned firms in this market. However, despite a growing academic literature, there is still limited evidence on the link between public procurement and firms, which this paper contributes to address in two ways. First, this paper provides guidance on how to design a high-quality firm-level survey to study public procurement from the perspective of firms. Second, this paper presents some of the statistics and stylized facts that can be generated on public procurement from the existing World Bank Enterprise Surveys data, covering more than 150 countries worldwide. To sustain evidence-based policies in public procurement, firm-level survey data can be a valuable source of information on public procurement market. In particular, it can capture dimensions such as views and perceptions of firms that cannot be observed from e-government procurement data, it allows to study firms that never entered the public procurement market, and it provides data for countries that have not adopted an eGP system yet. Together with legislative and institutional reviews, and the analysis of transactional procurement data, firm-level survey data can be used to identify weaknesses of a public procurement system and inform reform efforts. This paper is part of a broader effort to continuously expand the available data, statistics, and tools for evidence-based policy making in public procurement
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9781835883549 , 1835883540
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This in-depth masterclass provides end-to-end coverage of developing enterprise-grade LLMs tailored to your unique use cases. Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. You'll learn how to make crucial architecture decisions, select optimal model types, configure hyperparameters, and curate quality training data. Discover professional techniques for pre-training, iterative fine-tuning, and rigorous model evaluation. The instructors reveal insider strategies to productionize your LLMs smoothly, monitor them proactively, and maintain optimal performance post-deployment. Following a structured curriculum spanning the complete LLM lifecycle, this masterclass empowers you with hands-on skills to build, refine, and deploy large language models with confidence. Turbocharge your generative AI initiatives and get the practical knowledge needed to create LLMs that solve complex challenges for your organization. What you will learn How to select the right LLM architecture for your use case Approaches for sourcing, cleaning, and labeling quality training data Pre-training methods and hyperparameter optimization Advanced fine-tuning techniques to boost performance Ways to thoroughly evaluate LLMs before deployment Best practices for monitoring, updating, and maintaining production LLMs Audience Data scientists, machine learning engineers, and AI developers seeking an in-depth understanding of large language model (LLM) development. This masterclass is designed for professionals aiming to build, optimize, and deploy enterprise-grade LLMs tailored to specific use cases, with a focus on practical skills and real business impact. About the Authors Maxime Labonne: Sr. Machine Learning Scientist, JPMorgan. Denis Rothman: Expert in AI Transformers including ChatGPT/GPT-4, Bestselling Author. Abi Aryan: ML Engineer and Author.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886281 , 1835886280
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Scrum (Computer software development) ; Agile software development ; Continuous improvement process ; Scrum (Développement de logiciels) ; Méthodes agiles (Développement de logiciels) ; Amélioration continue ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a comprehensive journey into Scrum and Agile project management in our course. Starting with foundational principles, we move on to advanced concepts, guiding you through effective project management with Scrum. Furthermore, gain insights into orchestrating Scrum Teams, exploring the nuances of running projects with Scrum, and understanding key Scrum concepts. Moving on, you will immerse yourself in the dynamic flow of Scrum Events and equip your toolkit with essential platforms using our Scrum Toolkit series. Next up, explore popular tools such as Jira, Microsoft Teams, Microsoft Planner, and the newly introduced Trello. Stay ahead with the latest trends by incorporating ChatGPT into Scrum Teams for optimization and productivity, a cutting-edge dimension unveiled in our course. As you progress through the course, witness Scrum in practice, honing your skills through practical applications. With high-quality video lectures, downloadable handouts for quick reference, and engaging quizzes, this course provides a dynamic and interactive educational experience. By the end of the course, you will have a solid grasp of Scrum and Agile project management. You will be well-versed in the Scrum culture, proficient in managing projects using Scrum methodologies, and skilled in running projects with Scrum Teams. What you will learn Learn to apply Scrum for project success Explore how to deliver business value through Scrum Accelerate project delivery by understanding Scrum Master diverse Scrum concepts for effective implementation Explore proficiency in utilizing Scrum tools Understand the depth of Scrum values, principles, and pillars Audience This course is tailored for diverse audiences, including beginners exploring Scrum and those seeking certification. Ideal for project managers, developers, business analysts, architects, designers, and managers, it covers foundational to advanced Scrum concepts. Whether you are starting your Scrum journey or aiming to enhance existing skills, this course provides valuable, concise, and flexible learning experiences for successful Scrum adoption in various professional roles. About the Author YESI EDUCATION: Mauricio Rubio Parra is an Agile Guru and the founder of YESI EDUCATION. In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. YESI EDUCATION is a global online education business with over 100 products that reach more than half a million students in over 200 countries. Their portfolio of products includes online courses, eBooks, audiobooks, newsletters, apps, podcasts, and other educational resources such as templates. YESI is formally incorporated and headquartered in Sydney, Australia, and has three main divisions: education, property and invest. YESI, founded in 2016, has a strong focus on passive income generation and wealth creation. The company constantly explores new revenue streams, disruptive and innovative technologies as well as investment opportunities and new products within its three divisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886649 , 1835886647
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Computer science Mathematics ; Apprentissage automatique ; Informatique ; Mathématiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course starts with an introduction to the key concepts and outlines the roadmap to success in the field. You'll begin by understanding the foundational elements of matrix and vector derivatives, exploring topics like linear and quadratic forms, chain rules in matrix form, and the derivative of determinants. Each concept is reinforced with exercises, ranging from quadratic challenges to least squares and Gaussian methods. The course progresses into optimization techniques essential in data science and machine learning. Delve into multi-dimensional second derivative tests, gradient descent in one and multiple dimensions, and Newton's method, including practical exercises in Newton's Method for least squares. An additional focus is set on setting up your environment, where you'll learn to establish an Anaconda environment and install crucial tools like Numpy, Scipy, and TensorFlow. The course also addresses effective learning strategies, answering pivotal questions like the suitability of YouTube for learning calculus and the recommended order for taking courses in this field. As you journey through the course, you'll transition from foundational concepts to advanced applications, equipping yourself with the skills needed to excel in data science and machine learning. What you will learn Understand matrix and vector derivatives Master linear and quadratic forms Apply the chain rule in matrix calculus Solve optimization problems using gradient descent and Newton's method Set up the Anaconda environment for machine learning Install and use key libraries like Numpy and TensorFlow Develop effective strategies for learning calculus in data science Audience This course suits students and professionals eager to learn the math behind AI, Data Science, and Machine Learning, ideal for deepening knowledge in these advanced technology fields. Learners should have a basic knowledge of linear algebra, calculus, and Python programming to effectively understand matrix calculus. A keen interest and enthusiasm for exploring this intricate subject are also crucial for a fulfilling learning experience. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Disaster Finance ; DRFI ; Finance and Financial Sector Development ; Financial Crisis Management and Restructuring ; NCA ; North Central America
    Abstract: The objective of this feasibility study is to identify disaster risk finance and insurance (DRFI) solutions for up to 1.9 million family farmers in El Salvador, Guatemala, and Honduras. This study is motivated by an emerging consensus on the need to design and implement large-scale DRFI solutions to improve the financial resilience of family farmers in North Central America (NCA) and reduce their vulnerability to extreme weather events and climate risks. The feasibility study provides an initial assessment of the technical, operational, financial, and policy considerations for developing and implementing DRFI solutions for family farmers in NCA. The feasibility study considers lessons learned from existing large-scale DRFI solutions in peer countries as well as ongoing programs and pilots in NCA
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Education Study
    Keywords: Accreditation Policies ; Childhood Development ; Early Childhood Development ; Early Education ; ECED ; Education ; GOI
    Abstract: Investments in early years of education and childhood development are among the most cost-effective and beneficial a country can make to tackle learning poverty, promote healthy child development, and enhance shared prosperity. Over the past two decades, the Government of Indonesia (GoI) has scaled up its commitment to early childhood education and development (ECED) through various educational reforms, policies, programs, and financial investments. With the expansion of Indonesia's ECED system, the GoI has committed to improving its quality since the early 2000s. As a key mechanism to raise the quality of ECED services, the GoI actively encourages PAUD centers to become accredited. An analysis of factors that influence whether and how PAUD centers participate in the accreditation system is helpful to inform continuous quality improvement of Indonesia's ECED services. The World Bank is providing the Ministry of Education, Culture, Research, and Technology (MoECRT) technical assistance and advice to improve Indonesia's ECED system. Supported by the Learning for Human Capital Development Programmatic Advisory Services and Analytics (PASA), this study was conducted to inform further improvements to Indonesia's ECED accreditation system. This report presents the findings from the abovementioned ECED accreditation system assessment and is organized in four main sections after an introduction. Section I describes the study's background and the country context, with emphasis on the ECED system and its quality assurance mechanisms. Section II details the methodology used. Section III presents a summary of the survey results. Section IV discusses the implications of the findings and outlines recommendations to inform accreditation policies and programs
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Social Analysis
    Keywords: Early Childhood ; Economic Growth ; Human Capital ; Human Capital Protection ; Macroeconomics and Economic Growth ; Social Protections and Assistance ; Social Protections and Labor ; Strengths and Gaps
    Abstract: This human capital review assesses human capital outcomes in Mauritania and identifies actions to strengthen, utilize, and protect human capital. The government of Mauritania has demonstrated a strong commitment to placing human capital at the forefront of its long-term vision, with dedicated efforts focused on enhancing childhood health and education outcomes. Despite Mauritania's positive initiatives, the country's human capital wealth per capita has declined over the last 20 years; and it is imperative to look at ways to quickly reverse this situation. Children born today in Mauritania will only be 38 percent as productive when they grow up as they could have been had they enjoyed complete education and full health. Increasing the productivity of Mauritanians--both men and women--and thus allowing them to fully contribute to the development of their society entails transforming the human capital challenge to a human capital opportunity. This report takes a comprehensive, cross-sectoral approach and proposes recommendations for building, protecting, and utilizing human capital in Mauritania
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other ESW Reports
    Keywords: Finance and Financial Sector Development ; Matching Grants ; Mutual Funds ; Science and Technology Development ; Tech Incubator Program for Startup ; Technology Innovation ; Tips
    Abstract: This report investigates the case of a Korean public-private matching grant program called the Tech Incubator Program for Startup (TIPS). Launched in 2013, the program provides a package of support to selected startups, including matching grant for research and development (R and D) and mentorship, for up to three years. After ten years in operation, TIPS is particularly well suited to answer the question of whether public funding can help startups innovate and subsequently improve their performance. Using a dataset that includes 1,650 startups that applied for TIPS between 2013 and 2020, this research analyzes the effects of TIPS on recipients' performance and offers empirical evidence to inform entrepreneurship policy. The results show that TIPS positively affected startup performance one year after selection in terms of innovation input and output, although it did not have a significant effect on revenue or research collaboration activities. The report concludes with five lessons derived from Korea's policy experience in designing and implementing TIPS: (i) a well-designed coordination mechanism may serve as a viable public-private partnership model for fostering innovative startups, (ii) a co-investment model can crowd in private investment and achieve a multiplier effect by reducing the risk of investment in early-stage startups, (iii) complementary supports that target different stages of the startup lifecycle are needed, (iv) patient capital and continuity in entrepreneurial policy with a long-term view are key to nurturing a vibrant entrepreneurial ecosystem, and (v) constant engagement with beneficiaries through data collection and monitoring enables the development of a dynamic monitoring and evaluation mechanism
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Policy Notes
    Keywords: Broadband Infrastructure ; Digital Divide ; Digitalization ; ICT Legal and Regulatory Framework ; Information and Communication Technologies ; Internet ; Outdated Legal Frameworks
    Abstract: Equitable access to broadband services is imperative to narrow the digital divide and for more people to benefit from digitalization. Compared to other ASEAN countries, the Philippines' internet connectivity lags in affordability, speed, and access, creating an uneven landscape for digital participation. Limited internet access curbs digital potential for citizens and businesses, with peri-urban connectivity being critical to future growth. The country's poor broadband infrastructure is rooted in outdated policy frameworks that stifle investment in rural areas and foster a market with weak competition, both of which hinder broadband expansion. Binding constraints underlying the Philippines' poor broadband infrastructure are inter-related, requiring a comprehensive package of reforms to yield desired entry, investment, and sector performance outcomes. The open access in data transmission (OADT) bill is a promising, viable start, among several proposals in Congress. Policymakers can build on immediate reforms through the open access bill as an entry point to broader and medium- to longer-term digital connectivity agenda. The cost of inaction - loss of growth opportunity, people remaining unequipped for future jobs, and widening of the digital divide - is too high for the Philippines
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Mongolia assists the World Bank Group (WBG) in better understanding how stakeholders in Mongolia perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Mongolia on 1) their views regarding the general environment in Mongolia; 2) their overall attitudes toward the WBG in Mongolia; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Mongolia; and 4) their perceptions of the WBG's future role in Mongolia
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Social Analysis
    Keywords: Access and Equity in Basic Education ; Access To Education ; Agriculture ; Climate Change Impact ; Covid-19 Impact ; Education ; Food Security ; Health Service Management and Delivery ; Health, Nutrition and Population ; Human Capital Accumulation and Utilization ; Inclusive Development ; Long-Term Economic Growth ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: This report is undertaken as a part of the Human Capital Project (HCP), a globalinitiative of the World Bank Group that aims to increase governments' awarenessof the importance of investing in people (World Bank date of publication not identifiedb). One of the maincomponents of the HCP is a cross-country metric--the Human Capital Index (HCI). The HCI estimates the amount of human capital a child born today can expect to accumulate by the age of 18, thus highlighting how current health and education outcomes shape the work productivity of the next generation. Moreover, given the cumulative nature of human capital, the HCI has clear milestones across the entire human life cycle: at birth, children need to survive; during childhood, they need to be well-nourished; at school age, they must complete all schooling and active adequate learning levels; and in adulthood, they need to stay in good health. Finally, the HCI includes a result: a score that ranges from 0 to 1. A country where an average child has virtually no risk of being stunted or dying before age five, receives high-quality education, and becomes a healthy adult, would have an HCI close to 1. Conversely, when the risk of being ill-nourished or prematurely dying is high, access to education is limited, and the quality of learning is low, the HCI would approach zero
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Health Sector Review
    Keywords: Governance ; Health Insurance ; Health Policy and Management ; Health, Nutrition and Population ; PHC ; Primary Health Care Performance ; Vital Signs Profile
    Abstract: This report presents the findings of the Vital Signs Profile (VSP) assessment conducted by the World Bank and the Primary Health Care Performance Initiative (PHCPI) in collaboration with Fiji's Ministry of Health and Medical Services (MHMS). The VSP provides an opportunity to assess the state of the primary health care (PHC) system in Fiji, highlighting areas of strength and challenges through the lens of the PHCPI framework. The framework organizes various domains and subdomains of primary health care using a logic model approach that encompasses the traditional inputs and outputs of PHC systems and emphasizes the capacity and processes of PHC service delivery and performance. Notably, while PHCPI recognizes the role of social determinants of health and intersectoral health promotion and prevention efforts as important factors influencing population health, the VSP is primarily focused on aspects of health service delivery. Fiji is one of four Pacific countries - alongside Kiribati, the Republic of the Marshall Islands, and Solomon Islands that have, with support of the World Bank, used PHCPI tools to take stock of current performance, safeguard what works well, and lay out a vision for areas requiring improvement
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Foreign Trade, FDI, and Capital Flows Study
    Keywords: East Asia ; FDI ; FDI Policy Reforms ; Foreign Direct Investment ; International Economics and Trade ; Liberalization ; Sub-Saharan Africa
    Abstract: A new report from the World Bank Group focuses on the trends in foreign direct investment (FDI), which encompasses foreign investment in new or existing firms and production facilities. FDI is a subset of overall capital flows, but it is perhaps the most critical because of its potential development impact and stability relative to other cross-border capital flows. Foreign capital flows to developing countries fell to an estimated USD 662 billion in 2022 from an average of over USD 1 trillion in the decade preceding the COVID-19 pandemic. Declining investment flows to developing markets largely reflect weaker macroeconomic prospects, geopolitical tensions, as well as the lasting impact of the COVID-19 pandemic. The trend is also linked to the ongoing process of shifting global value chains and the transformation of investment in terms of modes of entry, sources, and sectors, among other dimensions. Growing climate change impacts, rising interest rates, and policy changes in advanced countries--such as incentives for green investments and localization of supply chains for key technologies--have also had far-reaching implications for the allocation of investment across the globe. The study seeks to provide a granular analysis of shifts in foreign direct investment flows and policy trends and suggests responses that developing countries may consider in order to reverse recent declines and to enable more private capital to support their development needs
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Jamaica assists the World Bank Group (WBG) in better understanding how stakeholders in Jamaica perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Jamaica on 1) their views regarding the general environment in Jamaica; 2) their overall attitudes toward the WBG in Jamaica; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Jamaica; and 4) their perceptions of the WBG's future role in Jamaica
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Guinea assists the World Bank Group (WBG) in better understanding how stakeholders in Guinea perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Guinea on 1) their views regarding the general environment in Guinea; 2) their overall attitudes toward the WBG in Guinea; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Guinea; and 4) their perceptions of the WBG's future role in Guinea
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Social Protection Study
    Keywords: Employment ; Inclusive Society ; Income Inequality ; Labor Markets ; Social Protections and Assistance ; Social Protections and Labor ; Structural Drivers ; Wage
    Abstract: This report is intended to inform public debate and policymaking on income inequality in Thailand. It aims to provide a comprehensive analysis of income inequality in Thailand and identify opportunities to promote more inclusive growth. The analysis uses a wealth of data from a variety of sources (detailed in Appendix A) to examine the pattern, structure, and drivers of income inequality in the country, with a special focus on inequality and labor market supply-side factors. It is structured as follows. This section has laid the foundation for analysis, examining historical trends in both consumption - and income-based measures of inequality while providing geographic context and data on public perceptions about inequality. It also provided a summary of literature findings. Section 2 analyzes the pandemic's impacts on inequality, including the role that social assistance played in mitigating its effects but also the potential scarring effects on children's human capital development. Section 3 examines the structural drivers of inequality and its persistence, focusing on the role of inequality of opportunity in human capital development and access to basic services. Finally, Section 4 provides policy options to create a more inclusive society by addressing the root causes of persistent inequality and mitigating the challenges brought about by the pandemic. In particular, since a significant share of the poor in Thailand are engaged in agriculture, the report underscores that improving farm incomes is crucial for alleviating poverty and reducing inequality. As such, Section 4 draws its recommendations from a recent study on the key challenges and opportunities facing Thai farmers to raise agricultural productivity and incomes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Demand Shortfalls ; Economic Forecasting ; Economic Growth ; Growth ; Inflation ; Investment Shifts ; Macroeconomics and Economic Growth ; Property Sector
    Abstract: Economic activity in China has picked up in 2023, but the recovery remains fragile. Real GDP growth accelerated to 5.2 percent y/y in the first three quarters of 2023, driven by demand for services, resilient manufacturing investment, and public infrastructure stimulus. The initial phase of economic reopening triggered a surge in economic activity in Q1, but growth momentum decelerated rapidly in Q2 before recovering modestly in Q3. The volatile growth performance, compounded by persistent deflationary pressures and still weak consumer confidence, suggests continued fragility in the recovery. China's investment deceleration has been one of the key drivers of the overall growth slowdown in recent years. Together with the decline in aggregate investment growth, there has been a marked shift in the composition of investment. Structural reforms are crucial both to accelerate rebalancing towards higher consumption and to mitigate risks of inefficiencies in capital allocation. Following recent statements by policymakers, a renewed focus on structural reform implementation with specific measures strengthening the rule of law, independent enforcement of regulations, fostering competition, and ensuring a level-playing field could help ensure that resources are allocated to the most productive sectors and firms. Deepening financial sector reform will enhance market-based financial intermediation. Measures to improve the progressivity of the fiscal system, reform the hukou system, and foster inclusive finance will support household consumption growth
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: CEMAC ; Country Level ; Economic Forecasting ; Economic Outlook ; Macroeconomics and Economic Growth
    Abstract: The CEMAC Economic Barometer is a World Bank publication that presents a snapshot of recent developments in and the economic outlook of the CEMAC region, followed by a brief assessment at the country level. The Economic Barometer also includes a focused technical section on a theme of regional relevance. This edition's special topic provides policy options for the CEMAC countries to take better advantage of future commodity price booms
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Health Sector Review
    Keywords: Health Economics and Finance ; Health Sector ; Health, Nutrition and Population ; International Financing ; Investments ; Ukraine
    Abstract: The full-scale invasion of the Russian Federation in Ukraine has immense local impact and global consequences. Ukraine is experiencing huge human and economic suffering, which will have long-lasting effects. This war has been particularly devastating for the Ukrainian health sector, tremendously increasing the urgent need for specific services and simultaneously obstructing health outcomes and access to health care due to hostilities, disruption of service delivery, and damage and destruction of health facilities. Moreover, the recovery of Ukraine is shrouded in uncertainty as the duration of the ongoing war and the frequency and localization of the attacks are unknown, all occurring against the backdrop of economic challenges within the country and at a global scale. Despite an expected international effort to finance the recovery of Ukraine akin to the Marshall Plan, financial resources may not be easily available or may become more scarce and more expensive. Investments will receive more scrutiny, and competition for funds will increase due to monetary tightening, rising interest rates, and possibly sustained high inflation (International Monetary Fund 2022). However, in the short to medium term, Ukraine is expected to have favorable access to international financing on concessional terms. While Ukraine is struggling with the gruesome immediate impact of the war and a fight for survival, the shared understanding emerges that going back to business as usual will neither be possible nor desirable. This moment may also serve as a window of opportunity for rapid reform and innovation of health service delivery in Ukraine. Improving and reconstructing services while restoring and stabilizing them is critical to aiding a suffering population and to laying strong foundations of governance that will have lasting impacts into the country's future. This document provides a proposal for stakeholdersin the Ukrainian health sector on how service delivery may need to change, how to deal with this change, and how the health sector may come out stronger in the longer term. It focuses on the organization of health care service delivery and shares considerations of how it may develop using a long-term (10+ years) perspective
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Health Sector Review
    Keywords: Health Insurance ; Health Monitoring and Evaluation ; Health, Nutrition and Population ; KIRIBATI ; PHP ; PHPCPI ; Vital Signs Profile
    Abstract: The assessment of Kiribati's primary health care (PHC) system, carried out by the World Bank in collaboration with the Government of Kiribati under the Primary Health Care Performance Initiative (PHCPI), marks a unique opportunity to identify the system's strengths and gaps and to catalyze further improvements. The PHCPI tools, including the Vital Signs Profile (VSP) methodology, provide important insights into the country's PHC system and generate actionable policy recommendations for improvement
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Health Sector Review
    Keywords: Access and Coverage ; Equity ; Financing ; Health Insurance ; Health Monitoring and Evaluation ; Health, Nutrition and Population ; PHCPI Framework ; PHP ; Quality
    Abstract: This report presents the findings of the primary health care (PHC) system in the Republic of the Marshall Islands (RMI), an assessment that the World Bank conducted in consultation with the Ministry of Health and Human Services (MHHS) of the government of RMI. The assessment provides an opportunity to understand the performance of RMI's PHC system, highlighting important areas of strengths and opportunities to address ongoing challenges. The assessment uses the Primary Health Care Performance Initiative (PHCPI) framework, which organizes various domains and subdomains of primary care using a logic model approach that encompasses the traditional inputs and outputs of a system, emphasizing service delivery and performance
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Social Protection Study
    Keywords: Childcare ; Early Childhood Development ; Education ; Legal Framework ; Policies ; Services Mapping ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: The "Comprehensive Assessment of the Childcare Landscape in Lebanon: A Mixed Methods Study" analyzes the supply and demand of formal childcare services for children aged 0-3. It provides a review of Lebanon's regulatory and institutional framework around childcare, maps out the current supply of services including cost and quality aspects, and deepens the understanding of households' childcare needs. Findings show that there is a mismatch between supply and demand, with a gap in provision for the youngest children and that supply is mostly private, costly, and concentrated in coastal areas. Childcare responsibilities limit women's ability to join the labor force, and affordability is a main constraint for families to access services, resulting in low demand for formal childcare. The study proposes measures for an inclusive expansion of quality and affordable childcare services in four areas: (i) an enabling environment for efficient, affordable provision of quality childcare services, (ii) a more equitable distribution of the unpaid care work burden within the household, (iii) improved State support to address households' care needs, and (iv) inclusive family-friendly workplace conditions in the private sector
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Equitable Growth, Finance and Institutions Insight
    Keywords: Anticorruption Agenda ; Governance ; Governance and Financial Sector ; Integrity Risks ; Law and Development ; Public Administration ; Public Procurement
    Abstract: The Armenia public sector accountability survey is instrumental in addressing the disparities between de jure laws and regulations and de facto practices and seeks to fill existing knowledge gaps and inform further definition and implementation of the government's anticorruption initiatives. The survey was implemented by the Corruption Prevention Commission (CPC) and the World Bank. It aimed to: (i) provide a comprehensive assessment of the patterns and determinants of integrity risks, and how they can impact productivity and performance in the public administration in Armenia; (ii) understand the perceptions of Armenian public servants regarding ongoing anticorruption initiatives, their awareness of integrity risks, and the needs for further interventions; and (iii) generate evidence, support and inform further definition of reforms and anticorruption initiatives that help address and counter weak integrity practices in the public sector in Armenia. By highlighting the disparities between de jure laws and de facto practices, particularly in terms of integrity within the public sector, this survey aimed to serve as a cornerstone for informing effective implementation in targeted interventions and bridging the gap between policy intentions and actual practices within Armenia's governance. The Armenia public sector accountability survey was aimed at public servants in selected public entities in Armenia, including central ministries and agencies, regional governments, and selected municipalities across the country. The analysis of the survey findings is anchored in the government production function conceptual framework and adjusted to explicitly take into account the drivers and consequences of corruption
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Cyclonic Storm ; Environment ; Grade Methodology ; Natural Disasters ; Rakhine State ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: Extremely severe cyclonic storm Mocha made landfall as a Category 4-equivalent cyclone in the Saffir-Simpson hurricane wind scale on Sunday May 14, 2023, at 07:07 UTC (14:07 local time) around Sittwe city, the capital of Rakhine State, Myanmar. Given the fragile and conflict-affected situation with limited access in Myanmar, the World Bank has adopted the Global RApid post-disaster Damage Estimation (GRADE) methodology to estimate damages arising from Cyclone Mocha. GRADE is a remote, desktop analysis to estimate damage to capital stock. This report summarizes the results of the GRADE conducted to assess damages following the impact of Extremely severe cyclonic storm Mocha in Myanmar during May 2023
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Zimbabwe assists the World Bank Group (WBG) in better understanding how stakeholders in Zimbabwe perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Zimbabwe on 1) their views regarding the general environment in Zimbabwe; 2) their overall attitudes toward the WBG in Zimbabwe; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Zimbabwe; and 4) their perceptions of the WBG's future role in Zimbabwe
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Attitudes ; Development Economics and Aid Effectiveness ; Effectiveness ; Governance ; International Governmental Organizations ; Macroeconomics and Economic Growth ; Participations and Civic Engagement ; Social Development ; Stakeholder Engagement ; World Bank Group Knowledge ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Serbia assists the World Bank Group (WBG) in better understanding how stakeholders in Serbia perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Serbia on 1) their views regarding the general environment in Serbia; 2) their overall attitudes toward the WBG in Serbia; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Serbia; and 4) their perceptions of the WBG's future role in Serbia
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: IEG Independent Evaluations and Annual Reviews
    Keywords: Finance and Development ; Finance and Financial Sector Development ; Financial Support ; IDA ; Jobs ; Labor Markets ; Reform ; Social Protections and Labor
    Abstract: This evaluation is the first stage of the Independent Evaluation Group's assessment of the World Bank's support for more, better, and more inclusive jobs through International Development Association (IDA) financing, and it assesses the implementation of IDA-supported interventions directly supporting its jobs objectives across the three Replenishment cycles from fiscal years 2015 to 2022. Supporting the creation of more, better, and more inclusive jobs is critical towards achieving the goals of poverty reduction and shared prosperity in countries. This is especially true for countries that are eligible for International Development Association (IDA) financing. Since 2014, IDA has included jobs as a special theme, and subsequent IDA replenishments have had what this evaluation calls an 'IDA jobs strategy.' This strategy included explicit objectives, a series of policy commitments to achieve them, and results indicators to track them. This evaluation represents the first stage of the Independent Evaluation Group's assessment of the World Bank's performance in supporting more, better, and more inclusive jobs through IDA financing. It assesses the implementation of IDA-supported interventions that directly supported its jobs objectives across the three Replenishment cycles from fiscal years 2015 to 2022. The evaluation answers two questions: (i) To what extent IDA's strategy on jobs was grounded in sound analytics, adaptive, and operationally relevant (ii) To what extent the strategy has been translated into relevant and effective jobs interventions that directly address the objectives of more, better, and more inclusive jobs The scope of the evaluation is limited to the three main channels for achieving IDA jobs objectives: acting on labor demand, increasing labor supply, and improving labor market flexibility and geographic mobility. The report offers recommendations for further strengthening of the IDA jobs agenda towards the objective of supporting more, better, and more inclusive jobs
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: IEG Independent Evaluations and Annual Reviews
    Keywords: IDA ; Private Investment ; Private Sector ; Private Sector Development ; Private Sector Economics ; Private Sector Window (PSW)
    Abstract: The private sector is essential for creating jobs and prosperity in poor countries, but developing it is challenging, especially in fragile and conflict-affected situations (FCS). The IDA Private Sector Window (PSW) is a blended finance facility that enables the International Finance Corporation (IFC), the Multilateral Investment Guarantee Agency (MIGA), and third-party private sector investors to conduct high-risk transactions in International Development Association (IDA) countries and FCS countries. This evaluation aims to assess the usage, market development potential, and enabling factors of the PSW. The evaluation assesses how the usage of the PSW has changed from its inception in 2017 to 2023 and explores its potential market development effects and its enabling factors, namely concessionality (for IFC and MIGA) and additionality (for IFC). Concessionality is the level of subsidy needed for IFC and MIGA to offer transactions in PSW-eligible countries at market prices. Additionality is the unique support IFC brings to private investments (on a project basis) that is not offered by commercial sources of finance. It comprises financial and nonfinancial additionality. This evaluation assesses the PSW across three IDA cycles: IDA18, which covers FY18-20; IDA19, which covers FY21-22; and IDA20, which covers FY23-25. It updates the 2021 IEG early-stage assessment of the PSW (FY18-20) and complements the IDA20 PSW Mid-Term Review, which was prepared jointly by IDA, IFC, and MIGA
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Carbon Pricing ; Economic Forecasting ; Economic Growth ; Energy ; Energy and Economic Development ; Energy Prices ; Growth and Real Sector ; Inflation ; Macroeconomics and Economic Growth
    Abstract: The twin shocks of the pandemic and weak global trade has particularly impacted Thailand due to the country's position as a trade and tourism hub. Thailand's tourism arrivals reached only 75 percent of pre-pandemic levels in September despite the ongoing growth in global services trade. Visitor numbers increased across the board, except for China and Japan which are experiencing economic slowdown. The economic recovery faltered due to global headwinds as growth fell to 1.5 percent year-on-year in 2023 Q3, well below expectations. Thailand has implemented a range of policies to reduce greenhouse gas emissions and has taken the first steps to implementing comprehensive carbon pricing. This report explores some of the complexities involved in implementing carbon pricing. It finds that Thailand has already taken some of the most difficult steps in setting up a comprehensive carbon pricing policy instrument. Important questions remain to be addressed about what form carbon pricing should take in Thailand and which economic sectors should be included in a carbon pricing scheme. The potential benefits from carbon pricing may be substantial. Carbon pricing is likely to play an important role in meeting future emission reduction targets, reducing environmental degradation and air pollution while positioning Thailand as a regional leader in green and sustainable growth
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Economic Growth ; Financial Sector ; Fiscal and Monetary Policy ; Food Security ; Inflation ; Macroeconomics and Economic Growth ; Monetary Policy ; Real Sector
    Abstract: Notwithstanding slower global growth and lingering impacts of recent catastrophic floods, private sector activity, outside the oil sector, has been supported by a relative return to peace, and higher government spending. Nevertheless, the economy is estimated to have contracted by 0.4 percent in FY23/24, reflecting drags from oil production. Supported by a successful exchange rate liberalization, inflation averaged -3.2 percent in 2022 and around 3 percent in the first nine months of 2023. Monetary policy has tightened in recent months, but it remains imperative that the central bank refrain from financing the fiscal deficit. The FY23/24 budget projects a smaller financing gap of about 13 percent of budget expenditures comparedto previous years. However, financing vulnerabilities remain high because of limited fiscal and external liquidity buffers and limited debt-carrying capacity
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Public Expenditure Review
    Keywords: Finance and Financial Sector Development ; Fiscal and Monetary Policy ; Macroeconomic Performance ; Macroeconomics and Economic Growth ; Public and Municipal Finance ; Public Expenditure ; Public-Private Partnership ; Revenue Mobilization ; State-Owned Enterprises (SOEs)
    Abstract: The Lao PDR is facing unprecedented macroeconomic challenges, which jeopardize hard-won development gains. Over the past two decades, the country attracted considerable foreign investment and fostered regional integration, which contributed to a long period of high economic growth. Many human development indicators improved during the period 2000-2019, including child and maternal mortality, school enrolment, income poverty, and gender equity. However, economic growth was predominantly driven by large-scale investments in capital intensive sectors, such as mining and hydropower, which created few jobs and entailed environmental costs. Moreover, many public investments were financed by external debt, gradually jeopardizing debt sustainability and macroeconomic stability. Long-standing structural vulnerabilities have been exacerbated by the impacts of the COVID-19 pandemic and adverse global macroeconomic conditions. Since 2021, the national currency has depreciated considerably, and inflation soared. This has had a large negative impact on living standards, with many households struggling to cope. Meanwhile, limited spending on education, health, and social protection is undermining human capital and thus economic growth prospects. Significant debt pressures, especially short-term external liquidity constraints, have pushed the country into debt distress. This Public Finance Review identifies priority reforms to restore macroeconomic stability and boost prosperity. The objective of this review is to assess recent macro-fiscal performance, evaluate emerging fiscal risks, and propose policy reforms to secure fiscal sustainability, restore macroeconomic stability, and promote shared prosperity. This report is comprised of five chapters covering the main aspects of fiscal management: chapter 1 evaluates recent macroeconomic performance while placing fiscal policy in the broader macroeconomic context. Chapter 2 assesses domestic revenue mobilization efforts and scope for reforms to enhance tax collection. Chapter 3 investigates the size and composition of public expenditure, as well as measures to increase its efficiency and effectiveness. Chapter 4 discusses reforms of state-owned enterprises with a view to improving their financial performance, operational management, and corporate governance. Chapter 5 documents the experience with public-private partnerships and provides recommendations to maximize value for money and reduce fiscal risks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource (210 pages)
    Series Statement: International Debt Report
    Parallel Title: Erscheint auch als
    Keywords: Bonds ; Creditor ; Data ; Debt ; Debtor ; Developing ; Development ; Economic ; FDI ; Finance ; Foreign Direct Investment ; Government ; Interest Payments ; Interest Rates ; Loans ; Maturity ; Principal ; Private Sector ; Public Sector ; Statistics
    Abstract: The International Debt Report (IDR) is a longstanding annual publication of the World Bank featuring external debt statistics and analysis for the 122 countries that report to the World Bank Debtor Reporting System. IDR 2023 is the 50th annual edition and includes (1) analyses of external debt stocks and flows as of end-2022 for these countries; (2) the macroeconomic and debt outlook for 2023 and beyond; (3) a focus on improved public debt transparency and the quality of debt reporting; (4) a discussion of the need for innovative approaches to debt management; (5) a commentary on how the International Debt Statistics database serves as an indispensable resource for researchers and policy makers; and (6) a one-page snapshot of relevant debt indicators and summary of debt stocks and flows for six years (2010 and 2018-22) for each country, plus global income group and regional aggregates. Unique in its coverage of the important trends and issues fundamental to the financing of low- and middle-income countries, IDR 2023 is an indispensable resource for governments, economists, investors, financial consultants, academics, bankers, and the entire development community. For more information on IDR 2023 and related products, please visit the World Bank's Debt Statistics website at www.worldbank.org/debtstatistics
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Energy Study
    Keywords: Anchoring and Mooring ; Energy ; Energy Resources Development ; Energy Yield ; Environment ; Environment and Energy Efficiency ; Floating Solar Photovoltaics ; FSPV Ecosystem ; HSE ; Inverter ; Power Plants
    Abstract: This report builds a compelling case for India to look beyond land and institute an ecosystem that supports the installation and operationalization of floating solar photovoltaics (FSPV) power plants. Since these plants are installed on the underutilized surfaces of large water bodies, no land needs to be diverted from other uses. The installation of FSPVs also spurs job creation and catalyzes the development of a domestic value chain as some of the components, such as floaters, need to bemanufactured close to installation sites. They also provide a range of other benefits as they generate relatively more power than ground-mounted solar plants (due to the cooling effect of water) and better utilize shared infrastructure such as transmission systems, wherever available
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Conflict and Development ; Damages ; Earthquake ; Environment ; Grade Methodology ; Herat Province ; Natural Disasters
    Abstract: Following the Herat province (Western Afghanistan) earthquake sequence of October 7 to 15, 2023, the World Bank carried out a remote desk-based assessment of the physical damages using the Global RApid post-disaster Damage Estimation (GRADE) methodology. The objective of the assessment is to develop a model-based estimate of the direct physical (economic) damages to residential buildings (houses), non-residential buildings (e.g., education, health, worship, commercial, industrial assets) and infrastructure (e.g., transport, power, water, telecommunications), and to evaluate the spatial distribution of damages in order to support the development of a roadmap for recovery and reconstruction. This report summarizes the key findings of the assessment
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Financial Sector Study
    Keywords: Equity ; Fiscal and Monetary Policy ; Fiscal Interventions ; Fiscal Policy ; Macroeconomics and Economic Growth ; Policy Reforms
    Abstract: The Lao People's Democratic Republic (Laos) is facing economic challenges. The country is experiencing a growth slowdown with high levels of public debt. Growing current expenditure and debt service obligations amid sluggish tax revenue led to a widening fiscal deficit in the early 2010s, which remained high into the 2020s despite fiscal consolidation efforts. COVID-19 and deteriorating macroeconomic conditions have disrupted human capital investment and are expected to have worsened the incidence of poverty and inequality. Fiscal policy can be an instrument to address these challenges, but its role has been constrained by a precarious fiscal position. This report analyzes the distributive effects of the Lao fiscal system and potential reforms to address current economic challenges. The analysis adopts the Commitment to Equity (CEQ) methodology to assess the distributional impact of the Lao fiscal system on household welfare. The methodology disaggregates income to include or exclude fiscal interventions to analyze the impact of the fiscal system and each intervention on poverty and inequality. Fiscal interventions can be classified into three categories according to how they are imposed on households: direct interventions (direct taxes, social security contributions, and cash transfers), indirect interventions (indirect taxes and subsidies), and in-kind interventions (public health and education). The framework assesses how progressive a fiscal system and each fiscal intervention are and measures their impacts on poverty and inequality
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880760 , 1835880762
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.15/5
    Keywords: Risk management ; Information technology Security measures ; Gestion du risque ; Technologie de l'information ; Sécurité ; Mesures ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The NIST 800-37 Risk Management Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology to assist organizations in managing and mitigating information security risks effectively. It provides a structured approach to risk management, emphasizing continuous monitoring and a lifecycle process for securing information systems. The NIST 800-37 Risk Management Framework (RMF) guides organizations through a systematic risk management process. It begins with "Prepare" to establish context and allocate resources, followed by "Categorize" for classifying information systems. The subsequent steps include "Select Controls" to tailor security measures, "Implement Controls" to put them into practice, "Assess Controls" for effectiveness evaluation, "Authorize" for system approvals, and "Monitor" for continuous oversight and response to changes in the information system's environment. Upon completion, you will possess a clear understanding of the framework principles and components. Armed with this knowledge, navigate the risk management lifecycle with confidence. You will gain proficiency in identifying, assessing, and prioritizing risks, selecting and implementing security controls, and ensuring continuous monitoring and authorization aligned with industry best practices. What you will learn Understand core principles and significance of NIST 800-37 RMF Learn methodologies for risk identification and prioritization Choose and implement controls based on organizational risk Assess implemented controls and identify vulnerabilities Grasp the steps to grant system and information authorizations Integrate NIST 800-37 RMF with other compliance frameworks and standards Audience The course is tailored for cybersecurity professionals, including risk managers, information security officers, compliance officers, IT and security managers, and risk assessment professionals. Geared toward individuals with a foundational knowledge of cybersecurity, the course equips you with skills to navigate the risk management lifecycle. You will gain proficiency in risk identification, assessment, and prioritization, and implementation of security controls. The course addresses RMF integration with compliance frameworks for those overseeing regulatory compliance within organizations. About the Author Alexander Oni: Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887080 , 1835887082
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/4
    Keywords: Computer software Testing ; Automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing and comparing Cypress with Selenium, emphasizing Cypress's architectural advantages in automation. It guides you through tool installation across various operating systems and dives into Cypress's setup, test runner, and structure, laying a solid foundation for your journey in automation. Beyond setup, the course dives into Cypress automation, covering syntax, locator strategies, selector playground, CSS selectors, and XPath use. It enhances your grasp of Cypress commands, including chaining and handling child elements, and contrasts Cypress's asynchronous nature with synchronous operations, guiding you in promise handling. You'll explore Cypress assertions, including implicit, explicit, and common types used in testing. The course emphasizes interactive web UI elements, teaching interaction techniques with checkboxes, dropdowns, and mouseover events, and covers element list handling with loops and iterations. Additionally, learn to navigate through windows, tabs, popups, and frames, and address common challenges while building a strong framework. The course thoroughly covers the POM, environment variables, and experimental features. It also delves into API testing and automation, along with practical sessions on Git, GitHub, Jenkins, and advanced CSS selectors. What you will learn Understand Cypress architecture and how it compares with Selenium Understand the asynchronous nature of Cypress and handle promises Conduct both implicit and explicit assertions in testing Interact with web UI elements like checkboxes, dropdowns, and mouseover events Perform API automation with Cypress Integrate and manage Jenkins for continuous integration Audience Ideal for a wide range in software testing, this course benefits QA professionals and manual testers transitioning to automation, enhances skills, aids fresh graduates in software engineering, and offers QA Team leads and Managers insights into automation tools and best practices. Perfect for all levels in the QA and testing field. No prior automation or coding experience required; course suitable for beginners with JavaScript concepts included. Requires only a Windows/MAC computer and a browser (Firefox or Chrome). About the Author Let's Kode It : Let's Kode It is here with a mission to teach everyone a new skill--doing what they have always wanted to do. They are a group of software professionals with more than 10 years of expertise in different areas of software industries and working as team leads in multinational companies. All their instructors have master's degrees from reputed universities. Their expertise lies in various fields of Software Development Life Cycle (SDLC)--from application development and testing to system administration. Be it programming or creating a professional-looking MS Word document, they believe anyone can code and that coding is not something out of this world. Their goal is to offer high-quality technology courses, which will suit a newbie as well as an intermediate.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465578 , 1835465579
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: React (Electronic resource) ; Web site development ; Web applications Programming ; Sites Web ; Développement ; Applications Web ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the course, your gateway to mastering Recoil for React web development. Recoil, a powerful state management library by Facebook, revolutionizes app development with its simplicity and scalability. In this course, you will delve into Recoil's fundamentals, understanding why it's favored over Redux, and how it enhances React applications. Starting from scratch, you will learn to configure and use Recoil atoms and selectors, persist state data efficiently, and leverage advanced features like atom families. Embrace the transition from junior to senior developer by mastering Recoil's complexities, refining skills for scalable web and mobile applications, and acing declarative JavaScript solutions for interviews. Throughout the journey, you will build an app, progressing from the basics to advanced topics. Explore Recoil's nuances as we deep-dive into selector functionalities, state persistence mechanisms, and crafting performant logic for complex applications. By the end of this course, you will be equipped with a deep understanding of Recoil, confidently implementing scalable and high-performance state management in React applications. What you will learn Grasp Recoil's principles for popular state management Craft UI elements for better user interaction with Recoil Implement dynamic search filters with Recoil tools Persist data across sessions using recoil-persist Transition local to global state management through Recoil Build scalable state logic using advanced Recoil features Audience This course caters to a diverse audience, spanning junior to senior React developers eager to bolster their skill set. Beginners seeking a strong foundation in React and Recoil, intermediate developers aspiring to refine scalable code, and seasoned professionals keen on staying updated with modern industry requirements will all find immense value. Basic knowledge of JavaScript and React is recommended, but not mandatory, ensuring accessibility for learners at varying proficiency levels. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883907 , 1835883907
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Artificial intelligence ; Apprentissage automatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is an innovative course tailored for those who aspire to master the dynamic fields of computer vision and generative artificial intelligence. This course offers a deep dive into the world of image recognition, object detection, and the magic of generative AI using tools like KerasCV, Python, TensorFlow, PyTorch, and JAX. This course guides you from the fundamentals of image classification to the intricacies of object detection, starting with the KerasCV library for deep learning. You'll learn to effectively use and fine-tune pre-trained models, create custom datasets for object detection, using tools like the LabelImg GUI program, and apply these skills to tackle real-world challenges. A key focus is the generative AI segment, particularly on Stable Diffusion, where you'll learn to generate detailed images from text, unlocking your creative potential in this advanced AI domain. This course offers a progressive learning path from basic concepts to advanced techniques, catering to both professional development and creative pursuits in AI. By the end, you'll have the confidence and tools needed for a variety of applications in the ever-evolving field of generative artificial intelligence. What you will learn Harness the power of the KerasCV library for efficient deep learning Master image classification techniques using pre-trained models Implement object detection in real-world scenarios Fine-tune models for tailored applications and datasets Create custom object detection datasets with LabelImg Understand the integration of TensorFlow, PyTorch, and JAX in computer vision Audience This course is ideal for individuals ranging from beginners to advanced learners who possess a fundamental understanding of machine learning and Python programming. It is especially beneficial for those keen on delving into the realm of computer vision using KerasCV. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881668 , 1835881661
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides a comprehensive exploration of Cisco Firewall and IPS systems, optimized for deployment within the AWS ecosystem. It commences with a foundational overview, catering to both novices and seasoned professionals. Beginning with AWS Virtual Private Cloud (VPC) configuration, you'll establish the foundation for building secure network infrastructures. The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. You'll master the Next-Generation Firewall virtual (NGFWv) deployment within AWS, bolstering your ability to safeguard networks against evolving cyber threats. Hands-on labs and practical exercises are integrated to impart real-world skills in configuring, troubleshooting, and securing Cisco Firewall and IPS systems. You'll gain expertise in risk management, report generation, and effective troubleshooting techniques. By course completion, you'll be well-prepared for Cisco CCNP Security SNCF (Exam 300-710), poised to excel in the realm of cybersecurity. What you will learn Configure AWS VPC for Cisco Firewall and IPS systems Deploy and manage FMCv and NGFWv in AWS Implement NGFW Routed and Transparent modes Explore multi-instance deployments and clustering Troubleshoot using CLI/GUI and perform packet capture Enhance security with Cisco AMP and other integrations Audience This course is ideal for cybersecurity professionals and network administrators looking to advance their skills in Cisco Firewall and IPS systems. A basic understanding of networking concepts and AWS is preferred. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463444 , 1835463444
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Web site development Computer programs ; Application software Development ; Python (Computer program language) ; Sites Web ; Systèmes-auteur ; Logiciels d'application ; Développement ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Next.js is a popular open-source JavaScript framework designed to make web development with React efficient and scalable. Next.js adds layers of abstraction to React and simplifies the process of building modern web applications. It provides a set of conventions and features that enhance the development experience, making it easier to create performant and SEO-friendly applications. This comprehensive Next.js course unfolds by beginning with an introduction to web development fundamentals, as it progresses through React basics, advanced Next.js concepts, and real-world deployment strategies. We will explore key topics such as server-side rendering (SSR), client-side rendering (CSR), static site generation (SSG), and incremental static regeneration (ISR). The course offers hands-on experience with a final project, covering everything from structuring applications to optimizing for performance and SEO. The modular format accommodates varying skill levels, ensuring a well-rounded and practical learning experience for all learners. Upon completion of this Next.js course, you will become proficient in web development fundamentals, React essentials, and advanced Next.js concepts. Through hands-on experience, master server-side rendering, client-side rendering, dynamic routing, and performance and scalability in real-world scenarios. What you will learn Master SSR, CSR, and SSG for optimized web development Explore React basics and advanced component development in Next.js Implement Next.js best practices for efficient and scalable web applications Learn to create dynamic routes for versatile content handling Deploy fully functional applications using Vercel and Git/GitHub workflows Enhance applications for search engines and social platforms through metadata and SEO practices Audience This Next.js course is tailored for a diverse audience, catering to both entry-level and seasoned developers. Ideal for junior developers, it provides a strong foundation in web development fundamentals, React basics, and advanced Next.js concepts. Intermediate developers can enhance their skills and gain mastery in the latest features of Next.js. Senior web developers seeking to stay updated with modern concepts will find valuable insights for optimizing web applications. No programming experience is required, but basic web development and JavaScript understanding is desirable for the course. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835883600 , 1835883605
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Computer science ; Systèmes d'exploitation (Ordinateurs) ; Informatique ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Linux, offering insights into its importance and widespread use in today's tech-driven world. You'll learn why Linux is the backbone of many servers, devices, and systems, and how its open-source nature fosters innovation and customization. The course focuses on choosing a Linux distribution, guiding you through the myriad of options available and helping you select the one that best fits your needs. This segment is crucial for understanding the diversity within the Linux ecosystem and how it caters to different user preferences and requirements. Next, we delve into choosing a desktop environment, emphasizing the significance of the user interface in your day-to-day interaction with Linux. You'll explore popular desktop environments, their features, and how to select one that aligns with your usability and aesthetic preferences. The course wraps up with a detailed walkthrough on installing software on Linux, covering various package managers and installation methods. This section is designed to equip you with the skills to extend the functionality of your Linux system and customize it to your liking.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884461 , 1835884466
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; COBIT (Information technology management standard) ; Technologie de l'information ; Gestion ; COBIT (Norme) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to COBIT 19, setting the stage for a comprehensive exploration of enterprise governance of information and technology. It delves into the significant benefits I&T governance brings to the table, emphasizing the importance of aligning IT processes with business goals. The course focuses on detailing what COBIT is and importantly, what it is not, establishing a clear understanding of its scope and application. Through an examination of COBIT's six principles for a governance system and its three framework principles, learners gain insights into the enhancements introduced in COBIT 2019. The course wraps up by guiding learners through the governance and management objectives, the components of the governance system, and the impactful design factors, alongside providing practical insights into the COBIT implementation guide approach. Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. What you will learn Understand enterprise governance of IT Navigate COBIT 2019 enhancements Identify governance and management objectives Apply COBIT in various IT scenarios Achieve COBIT certification readiness Plan for continual IT governance improvement Audience This course is ideal for IT professionals, auditors, and managers aiming to bolster their organization's IT governance. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885628 , 1835885624
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Python (Computer program language) ; Intelligence artificielle ; Python (Langage de programmation) ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative learning experience with 'Master ChatGPT and OpenAI APIs By Building AI Tools in Python.' This immersive course takes you from the basics of ChatGPT and OpenAI's potent APIs through a journey of building dynamic AI-powered tools. Discover the magic behind ChatGPT's conversational prowess and dive deep into the neural networks and transformers that make it tick. You'll start by creating and managing your ChatGPT account, understanding the model's anatomy, and grasping the limitations and capabilities of AI language models. Transitioning from theory to hands-on practice, the course guides you through content creation, code generation, and the intricacies of prompt engineering. Moreover, you'll venture into the realms of generative AI with Midjourney, craft AI-driven applications, and harness the synergy of OpenAI and DALL-E for on-the-fly image generation. This course demystifies the AI concepts crucial in today's technology landscape, providing you with the skills to innovate and excel in the burgeoning field of AI. What you will learn Navigate the foundational elements of ChatGPT and OpenAI APIs Generate creative content and code with ChatGPT's language model Design and implement AI applications with user-friendly interfaces Master the art of prompt engineering for optimized AI interactions Build AI-powered tools and images using OpenAI and DALL-E Develop secure, intelligent applications with advanced Python techniques Audience This course welcomes everyone from entrepreneurs to artists and developers, aiming to learn about cutting-edge AI technologies and build AI-powered applications. Basic programming knowledge is preferred but not mandatory, making this course accessible to a wide range of learners. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633074 , 183763307X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the foundational elements of Linux Shell Scripting, guiding you through basic script building and the use of variables to automate repetitive tasks efficiently. As the course progresses, it focuses on more complex concepts such as redirection, arithmetic operations, and conditional statements, enhancing your scripting skills for real-world applications. Through practical examples, you'll learn how to craft scripts that solve problems, automate tasks, and streamline your workflow. The course wraps up by delving into advanced topics such as loops, user input handling, and script control, equipping you with the knowledge to write sophisticated scripts. By the end of this course, you'll have a solid understanding of Linux Shell Scripting, enabling you to leverage its capabilities to optimize and automate your Linux environment. What you will learn Craft basic to advanced shell scripts Automate tasks using shell scripts Implement conditional logic in scripts Create loops for repetitive tasks Control script flow and execution Optimize Linux tasks through scripting Audience This course is ideal for IT professionals, system administrators, and developers looking to automate and optimize their Linux environments. Basic knowledge of Linux commands is required. Perfect for those aiming to enhance their scripting skills for efficiency. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835465462 , 1835465463
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: Web site development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Dive into the freelancing world with this course that bridges the theoretical and practical aspects of web development. This course is designed for aspiring freelancers and seasoned developers looking to expand their skill set with hands-on, project-based learning. You will embark on a journey to build a fully functional website for a surfcamp, complete with an integrated, customizable blog and sign-up forms, using NextJS and Strapi. This course stands out by focusing on real-world projects, avoiding generic examples and diving deep into the synergy of NextJS and Strapi for a flexible design and seamless developer experience. Learn how to deliver websites to clients who lack coding skills, allowing them to update content directly, rivaling the convenience of platforms like WordPress, Squarespace, and Wix with the power of a Headless CMS. From design to deployment, you will transform Figma designs into live sites, mastering the art of a seamless design-to-development workflow. With over 12 hours of content, the curriculum introduces new concepts at a comfortable pace, ensuring a comprehensive understanding of each element.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885925 , 1835885926
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Artificial intelligence ; Computer programming ; Chatbots ; Application program interfaces (Computer software) ; Python (Computer program language) ; Intelligence artificielle ; Programmation (Informatique) ; Interfaces de programmation d'applications ; Python (Langage de programmation) ; artificial intelligence ; computer programming ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive masterclass takes you on a transformative journey into the realm of LangChain and Large Language Models, equipping you with the skills to build autonomous AI tools. Starting with the basics, you'll set up your development environment, including OpenAI API and Python, and progress to advanced topics like LangChain's architecture, prompt templates, and parsers. The course meticulously guides you through creating complex chains, memory models, and agents, culminating in the development of practical applications such as PDF extractors, newsletter generators, and multi-document chatbots. With hands-on tutorials, you'll learn to leverage LangChain for tasks ranging from document loading and splitting to embedding vector stores for semantic similarity searches. By the end, you'll have the knowledge to implement AI in creative and impactful ways, from image-to-text conversion to building interactive chatbots and more, all while navigating the ethical considerations of AI deployment. What you will learn Configure OpenAI API and Python for AI development Create and manipulate LangChain prompt templates and parsers Implement LangChain memory models and chains for complex AI applications Develop real-world applications, including newsletter generators and chatbots Work with LangChain embeddings and vector stores for semantic searches Navigate the ethical and copyright implications of AI-generated content Audience This course is designed for a broad audience interested in artificial intelligence, from data scientists enhancing projects with AI and LangChain, to product managers boosting user experience with AI features. AI enthusiasts, tech innovators, and programmers will deepen their understanding of LangChain, unlocking new opportunities in AI-driven development and pioneering next-gen solutions. While specific knowledge of Python is not necessary, familiarity with programming concepts is essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835886007 , 1835886000
    Language: English
    Pages: 1 online resource (1 video file (34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: UNIX Shells ; Computer networks Security measures ; Data encryption (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835888728 , 1835888720
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Cloud computing ; Systèmes d'exploitation (Ordinateurs) ; operating systems
    Abstract: The course begins with an in-depth look at Linux's capabilities as a KVM host and guest, establishing a strong foundation in virtualization technology essential for modern cloud computing. Through hands-on examples, you'll learn how to efficiently set up and manage virtual machines, paving the way for more advanced cloud-based applications and services. Following this, the course delves into the practical steps for creating and configuring EC2 instances within Amazon Web Services (AWS), demonstrating the power and flexibility of cloud resources. You'll gain insights into selecting the right instance types for your projects, optimizing performance, and managing security settings to protect your cloud infrastructure. The journey continues with detailed instructions on deploying and fine-tuning Azure Virtual Machines (VMs). This section emphasizes the similarities and differences between Azure and AWS, equipping you with the knowledge to make informed decisions based on project requirements and cloud provider strengths. The course then shifts focus to containerization with Docker, highlighting Linux's role as both a host and a container platform. The course wraps up by reinforcing the learner's ability to navigate the complex landscape of cloud computing with Linux, from virtual machines to containerization.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462935 , 1835462936
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course not only equips you with the skills to write more efficient and effective scripts but also introduces you to the world of graphical scripting, allowing you to create visually interactive scripts that enhance user experience. From basic text-based menus to sophisticated graphical interfaces using dialog and its widgets, the course offers a comprehensive look at elevating command-line scripts to GUI-based applications, making your scripts more accessible to a wider audience. The exploration doesn't stop there; advanced sed techniques await, revealing the potential within multi-line commands and the intricacies of command negation for complex text processing challenges. Meanwhile, the dive into advanced gawk programming unveils the art of variable management, array handling, and the implementation of structured commands, further broadening your scripting capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883440 , 1835883443
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. What you will learn Secure passwords with best practices Conduct safe data disposal protocols Navigate networks with safety measures Identify various forms of malicious software Apply defenses against software threats Adopt proactive cyber hygiene habits Audience This course is ideal for individuals looking to bolster their digital security acumen. Tailored for users who wish to protect their online presence against evolving cybersecurity threats. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805123019 , 1805123017
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.276
    Keywords: Active server pages ; Microsoft .NET Framework ; Internet programming ; Web site development ; Programmation Internet ; Sites Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with an introduction, setting you up with essential tools and a clear roadmap for your learning journey. Delve into the fundamentals of .NET Core, understanding the MVC architecture, routing intricacies, and dependency injection. As the course progresses, you'll dive into Category and Product CRUD operations, gaining hands-on experience with database connectivity, Entity Framework Core, and dynamic UI development. We will learn the nuances of Razor Projects and the significance of N-Tier Architecture, enhancing your understanding of scalable and maintainable code structures. The Repository Pattern module deepens your grasp of efficient data handling, leading to seamless database transitions. We will also cover shopping cart implementation, order processing, and user management. You'll tackle advanced features like product image handling, social logins, and interactive UI elements, ensuring your e-commerce platform stands out. As you approach the course's climax, the focus shifts to crucial aspects of user authentication, role management, and secure user experiences with .NET Core Identity. The final modules guide you through deploying your application, integrating email services with SendGrid, and refining your project for real-world use. What you will learn Implement CRUD operations for products and categories Develop and manage Razor Projects with advanced features Apply N-Tier Architecture and Repository Patterns for scalable applications Build and manage shopping carts and order processes Integrate user authentication and manage roles using .NET Core Identity Employ deployment techniques and email integrations Handle multiple product images and social logins effectively Audience This course is designed for learners at all levels interested in mastering ASP.NET MVC Core (.NET 8), from the basics to advanced concepts. Ideal for anyone from web development beginners to seasoned professionals, this is a comprehensive guide for those looking to master Microsoft's latest framework and design large-scale projects using cutting-edge technologies. The ideal participants should have 3-6 months of experience in C# programming, and familiarity with tools like Visual Studio 2022, SQL Server Management Studio, and .NET 6 is recommended to fully benefit from the course content. About the Author Bhrugen Patel: Bhrugen Patel is a Microsoft MVP and a passionate Software Architect, known for his dedication to simplicity and attention to detail. With a background in programming that dates back to high school, Bhrugen has developed a range of web and desktop applications using .NET. He holds a Master's of Science in Computer Science and a Bachelor's in Computer Engineering, complementing his practical expertise. Alongside his full-time role, Bhrugen is devoted to teaching, driven by a mission to simplify coding and make it accessible. His goal is to alleviate the struggles of students seeking understandable resources. For Bhrugen, coding is not just a profession; it's a means to be creative and enjoy the journey of technological innovation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888148 , 1835888143
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Service-oriented architecture (Computer science) ; Architecture logicielle ; Architecture orientée service (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Docker, the pivotal tool in container technology, with our Docker Mastery course. Designed for beginners, this course guides you through the essentials of Docker, explaining its importance and how it revolutionizes deployment processes. Starting with an introduction to Docker and its ecosystem, you'll understand why Docker is a game-changer in software development and deployment. You'll set up your development environment, master Docker fundamentals through hands-on exercises, and learn to manage containers efficiently. The course progresses to more complex topics like Dockerfile, image publishing, Docker layers, caching, and Docker Compose for multi-tier applications. With a special focus on CI/CD using Docker, GitHub Actions, and AWS Elastic Beanstalk, you'll gain the skills to automate your deployment workflows, ensuring faster and more reliable releases. By the end, you'll have a solid foundation in Docker, ready to tackle real-world challenges and streamline your development pipeline. What you will learn Setup and manage your Docker development environment Run, stop, and manage containers and images efficiently Optimize Dockerfile for effective image creation and management Publish Docker images and explore Docker layers and caching Develop CI/CD pipelines with Docker, GitHub Actions, and AWS Deploy complex web applications using Docker Compose Audience This course targets aspiring DevOps professionals, software developers, system administrators, IT managers, QA engineers, and technology enthusiasts. Ideal for those aiming to refine development workflows, enhance application portability, and ensure project consistency using Docker. It's perfect for individuals responsible for efficient app deployment, scaling, and management, as well as QA professionals looking to improve testing accuracy. No Docker experience required; some programming knowledge preferred but not essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884904 , 1835884903
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics
    Abstract: The course embarks on a journey through the enchanting world of stylized 3D tavern modeling with Blender 4, starting from the foundational basics and resource pack overview to the sophisticated realms of advanced modeling, texturing, and lighting techniques. Through a series of meticulously crafted lessons, you'll learn to navigate Blender's interface, utilize geometry nodes for creative expression, and employ greyboxing for efficient layout planning. As the course progresses, you will dive deeper into the art of texturing, where wood shaders and stone supports bring your taverns to life with remarkable realism. You will also explore the structural integrity of wooden frameworks, intricate window designs, and the subtleties of lighting that illuminate your creations in a stylized yet realistic manner. The course concludes by teaching you rendering techniques that showcase your taverns in their best light, ensuring your skills are polished for any 3D design challenge. With a focus on both the technical and artistic sides of Blender, this course is your gateway to transforming imaginative concepts into stunning visual stories. What you will learn Initiate projects with Blender fundamentals Employ 3D modeling strategies for taverns Utilize geometry nodes for creative design Implement greyboxing for layout efficiency Apply advanced texturing for realism Design structural elements and frameworks Audience This course is ideal for 3D artists and designers eager to specialize in stylized model creation. Familiarity with basic 3D concepts is beneficial. This course is perfect for those looking to enhance their skills in Blender for professional or personal projects. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835464359 , 1835464351
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Penetration testing (Computer security) ; Sécurité informatique ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a solid foundation in Access Control and Password Management, setting the stage for a deep dive into the intricacies of cybersecurity. It progresses into exploring Active Defense mechanisms and the development of effective Contingency Plans, ensuring you're prepared for any security incident. The journey continues with an exploration of Critical Controls, Basic and Advanced Cryptography, ensuring a well-rounded understanding of key security principles. The course focuses on laying out a Defensible Network Architecture, Endpoint Security, and enforcing Windows and Linux security, providing a detailed look at how to secure modern operating systems and their networks. Through practical examples, you'll learn about Incident Handling and Response, IT Risk Management, and the importance of Security Policies and Virtualization for a robust cybersecurity posture. The course wraps up by covering Web Communication Vulnerabilities, Vulnerability Scanning, and Penetration Testing techniques, equipping you with the skills to identify and mitigate potential threats effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886267 , 1835886264
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. From the outset, learners are immersed in the Blender Basics Overview, accompanied by a rich Resource Pack, to swiftly get up to speed with the software's capabilities. Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. The course continues through the nuances of creating detailed 3D environments, leveraging greyboxing techniques, and applying lifelike textures and materials to bring scenes to life. Special emphasis is placed on generating creative references using AI, crafting natural elements with geometry nodes, and designing intricate architectural features that stand out in any portfolio. As the course progresses, learners delve into advanced modeling, lighting, and the art of texture application, culminating in a segment dedicated to rendering techniques that showcase their projects in the best light. By the end, participants are not just proficient in Blender; they are equipped with a holistic view of 3D design, enabling them to bring their creative visions to fruition. What you will learn Navigate Blender's interface and tools Create efficient asset management workflows Design 3D environments with advanced greyboxing Apply textures and materials for realism Construct architectural elements in Blender Model and texture dynamic 3D foliage Audience This course is ideal for 3D artists, designers, and enthusiasts looking to enhance their Blender skills. Prior basic knowledge of 3D concepts is helpful but not required. This course is perfect for those seeking to create professional 3D models and environments. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835887042 , 183588704X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer networks Security measures ; Client/server computing ; Web servers ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Architecture client-serveur (Informatique) ; Serveurs Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...