Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company.  (18)
  • Safari, an O'Reilly Media Company.
  • Vidéos sur Internet  (14)
  • Commerce
  • Computer security ; Management
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    DDC: 174/.9004
    Keywords: DataKind (Firm) ; Information technology Moral and ethical aspects ; Technological innovations Moral and ethical aspects ; Data curation Moral and ethical aspects ; Electronic videos ; Innovations ; Aspect moral ; Édition de contenu ; Aspect moral ; Information technology ; Moral and ethical aspects ; Technological innovations ; Moral and ethical aspects ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Data scientists often set out to make a positive impact—generating insights upon which organizations can make decisions. A key aspect of that work is ensuring that data is being collected, managed, and analyzed ethically. But as conversations about ethical data science increase, so do questions about how ethics in data science looks in practice: When do you do an ethics check? And what do you do if something seems off? Join us for this Case Study with DataKind’s Afua Bruce and Rachel Wells to hear what happened when their team faced an ethical challenge during a project that used social media data. While wrapping up the project, the team found out that they didn’t have full information on how the data was obtained. Faced with the decision about whether to deliver the project to the partner when the data trail was incomplete, DataKind reviewed the data source’s use policies, unpacked the trade-offs of different approaches, and carefully communicated with all stakeholders to eventually terminate the project. Afua and Rachel take you through the decision-making process, trade-offs, outcomes, and lessons learned from this project experience; highlight the importance of a data trail and evaluating where all data sources come from; and explain how to walk back a data science solution and project when ethical issues arise. Recorded on January 25, 2022. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned.
    Note: Online resource; Title from title screen (viewed February 25, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 39 min.)
    Edition: 1st edition.
    DDC: 006.3/1
    Keywords: Streaming video ; Internet videos ; Vidéo en continu ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Join us for an event focused on the many aspects of designing, deploying, and maintaining responsible AI. Event chair and responsible AI expert Rumman Chowdhury offers overarching context, stitching together shorter tech talks and conversations with industry leaders. What you'll learn and how you can apply it Discover what responsible AI includes (and what it doesn't) See what responsible AI looks like in action, from data to deployment to debugging Learn how to debug your ML model Explore real-world applications of responsible AI Understand what industry leaders think about when they think about responsibility This course is for you because... You're a machine learning engineer or data scientist interested in responsible AI. You're engaged in conversations about ethics and AI. You're wondering how to improve your own AI and machine learning. You're responsible for implementing fair or ethical AI practices in your role or project and looking for hands-on examples. Recommended follow-up: Read Responsible Machine Learning (report) Read AI and the Law (report) Read Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow (book)
    Note: Online resource; Title from title screen (viewed June 16, 2021)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    DDC: 005.3
    Keywords: Application software Development ; Computer programs ; Observers (Control theory) ; Application program interfaces (Computer software) ; Cloud computing ; Electronic videos ; Logiciels d'application ; Développement ; Logiciels ; Observabilité (Théorie de la commande) ; Interfaces de programmation d'applications ; Infonuagique ; APIs (interfaces) ; Application program interfaces (Computer software) ; Application software ; Development ; Computer programs ; Cloud computing ; Observers (Control theory) ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Observability is a hot topic in software engineering, but how do we decouple what’s useful from the hype? This case study will examine how Lightstep engineering adopted new practices and tools, balancing trade-offs between the needs of a product-driven organization, a small–but quickly growing–team, and the demands of our customers. While there’s no single right answer to “how do you implement observability?” we considered the needs of developers and their experiences, as well as the needs of users, to help guide decisions to keep teams aligned and our customers happy. Join us for this Case Study with Lightstep co founder and chief architect Daniel “Spoons” Spoonhower to learn how Lightstep engineering adopted new practices and tools for observability while balancing trade-offs between the needs of a small but quickly growing product-driven organization and the demands of its customers. This case study is for you if... You’re an engineer or engineering leader that is responsible for software reliability and performance You’re looking to take responsibility for larger systems as well as mentor other engineers You’ve been responsible for production systems in some way, including being on-call, leading on-call teams, or possibly just responsible for debugging software and understanding software performance What you will learn—and how to apply it By the end of this case study the viewer will understand: Observability, how it enhances traditional monitoring, and why it matters to running software services today How observability complements DevOps practices and cloud-native technologies The role of OpenTelemetry and other open source software in observability And you will be able to: Deploy new practices and tools as part of a modern observability practice How to motivate the consistent use of tools and standards across their engineering organizations How to use SLOs to translate between technical constraints and business needs
    Note: Online resource; Title from title screen (viewed December 9, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781801810111
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 6 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Vidéo en continu
    Abstract: We cover everything you need to know in order to pass the current 2020 AWS Certified Solution Architect Associate SAA-C02 exam About This Video Understand the various advantages of the multi-tier design Learn about self-managed DB solutions Understand about AWS WAF and other tools In Detail An AWS Certification is one of the hottest IT certifications in the job market today! Get your AWS Certified Solutions Architect Associate certification and change your life. The world has been experiencing major changes in the last few years. Rather than running infrastructure on prep (on premise), companies are moving to the cloud. This course was created from the ground up for the new AWS certification exam. Make sure you're ready to pass the AWS Solutions Architect Associate exam by taking this course. This course includes the following: Concise, focused lectures on specific AWS concepts and technologies An organization that directly mirrors the official exam objectives Hands-on challenges that ensure you have mastered key concepts Amazon Web Services or AWS is one of the most important skills you need to gain in 2021. Don’t miss out on this opportunity to improve your career with cloud services. Who this book is for This course is for anyone who is preparing for AWS Certified Solution Architect Associate SAA-C02 exam. Anyone who’s interested in architecting solutions in AWS will also find the contents of this course useful.
    Note: Online resource; Title from title screen (viewed September 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 53 min.)
    Edition: 1st edition
    DDC: 387.1/09714/27
    Keywords: Cargo handling Case studies ; Harbors Case studies ; COVID-19 Pandemic, 2020- ; Natural language processing (Computer science) ; Artificial intelligence ; Natural Language Processing ; Artificial Intelligence ; Electronic videos ; COVID-19 Pandemic ; (2020-) ; Pandémie de COVID-19, 2020- ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Artificial intelligence ; Cargo handling ; Harbors ; Natural language processing (Computer science) ; Québec ; Montréal ; Case studies ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: During the first months of the COVID-19 pandemic, it became crucial to prioritize shipments of critical cargo. In 2020 the Port of Montreal implemented an AI tool for the supply chain—in just six months from preparation to pilot delivery—with the goal of providing advance visibility to supply chain stakeholders by detecting critical cargo (e.g., masks, sanitizer, etc.). Join us for this Case Study with telecommunications engineer and AI advisor Adrian Gonzalez Sanchez to explore the tool and discover how it performed in practice. You’ll learn how pragmatic innovation (e.g., focusing on specific AI tasks, using only mature techniques, defining the “good enough” results in advance, etc.) and a common goal can lead to successful AI implementation. O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned. Recorded on November 9, 2021. See the original event page for resources for further learning or watch recordings of other past events. O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned.
    Note: Online resource; Title from title screen (viewed November 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781803242231
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 24 min.)
    Edition: 1st edition
    DDC: 005.7565
    Keywords: Microsoft .NET Framework ; Streaming video ; Internet videos ; Database management ; Electronic videos ; Microsoft .NET Framework ; Vidéo en continu ; Vidéos sur Internet ; Bases de données ; Gestion ; streaming video ; Database management ; Internet videos ; Streaming video
    Abstract: Learn how to use and take advantage of the full feature set of Entity Framework Core in your .NET applications About This Video Construct a data model using code-first and database-first workflows Understand Entity Framework commands Handle one-to-one, one-to-many, and many-to-many relationships In Detail In this course, Entity Framework Core - A Full Tour, you will learn to work with data in your .NET applications. We will review the general benefits of using Entity Framework Core 5, which is Microsoft's flagship Object Relational Mapper (ORM), to relieve you of many concerns and challenges that come with this component of software development. We will also spend time discovering how EF Core translates classes and references to database models and relationships. You will learn how to write queries, update databases incrementally, roll back changes, and explore the myriad capabilities that Entity Framework Core affords us. By the end of this course, you will have the skills and knowledge of Entity Framework Core needed to fluidly interact with data and write quires for .NET Core applications with ease. Who this book is for This course is for students who want to learn Entity Framework in a hands-on way. In order to take this course, you should have at least 3 months experience of programming in C#. If you need to strengthen your C# fundamentals, you can take the C# beginner course, C# Console, and Windows Forms Development with LINQ & ADO.NET.
    Note: Online resource; Title from title screen (viewed September 29, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 42 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; local ; Electronic videos ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Vidéo en continu
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 8+ Hours of Video Instruction Prepare for Microsoft Exam DA-100 and demonstrate your mastery of Power BI data analysis and visualization. This Exam DA-100: Analyzing Data with Microsoft Power BI video is designed for data analysts responsible for designing scalable data models, cleaning and transforming data, and presenting analytic insights through data visualizations using Power BI. This video focuses on the skills measured by the exam objectives, as updated by Microsoft on July 29, 2021. Prepare the data Model the data Visualize the data Analyze the data Deploy and maintain deliverables Using his years of experience teaching Power BI to a variety of learners, Microsoft Certified Trainer Chris Sorensen explains how to optimize Power BI features and functions and prepares you for what to expect on the DA-100 exam. In his engaging style grounded in real-world scenarios, Chris gives you insights to navigate and build effective Power BI solutions, quickly and effectively. With Chris as your guide, you are well-equipped to advance in your career as a data analyst. About the Instructor Chris Sorensen, CPA, CGA , is the Founder and President of Iteration Insights, a tech-enabled data analytics solutions provider based in Calgary, Alberta. He is a Microsoft Certified Data Analyst Associate and Microsoft Certified Trainer with a combined 20+ years of industry and teaching experience. In his career, he has led numerous Analytics projects in more than 15 industries across small to enterprise-sized organizations. As an adjunct instructor of the Business Intelligence program at SAIT, he plays a significant role in shaping new talent in Calgary’s emerging tech sector. Following his lifelong learning approach, Chris also coordinates both Power Platform and Azure Analytics User Groups, providing a space dedicated to knowledge-sharing and growing Alberta’s tech community. His favorite hashtag is #neverstoplearning. Skill Level Intermediate Who Should Take This Course Certification candidates preparing for Exam DA-100: Analyzing Data with Microsoft Power BI Data analysts who want to use Microsoft Power BI to maximize their data asse...
    Note: Online resource; Title from title screen (viewed August 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    DDC: 004.67/82
    Keywords: Amazon Web Services (Firm) ; Cloud computing ; Electronic videos ; Amazon Web Services (Firm) ; Infonuagique ; Cloud computing ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Though we have in the past depended on traditional data warehouses to drive business intelligence from data, they were generally based on databases and structured data formats, proving insufficient for the challenges that the current data driven world faces, especially the pace of data growth. Enter data lakes, which are optimized for unstructured and semi-structured data, can scale to PetaBytes easily, and allow better integration of a wide range of tools to help businesses get the most out of their data. There are few important properties worth understanding about data lakes. They include: Support for unstructured and semi-structured data. Scalability to PetaBytes and higher. SQL-like interface to interact with the stored data. Ability to connect various analytics tools as seamlessly as possible. Combine decoupled storage and analytics tools. Data volumes have grown to new scales and the demands of businesses have become more ambitious. For example, users now expect faster query times, better scalability, ease of management and so on. Former big data tools like Hadoop, Hive, and HDFS have made way for new and better technology platforms. Data and software professionals are now moving towards a disaggregated architecture, with Storage and Analytics layers very loosely coupled using REST APIs. This makes each layer much more independent (in terms of scaling and management) and allows using the perfect tool for each job. For example, in this disaggregated model, users can choose to use Spark for batch workloads for analytics, while using Presto for SQL heavy workloads, with both Spark and Presto using the same backend storage platform. This approach is now rapidly becoming the standard. Commonly used storage platforms include object storage platforms like AWS S3, Azure Blob Storage, Google Cloud Storage (GCS), Ceph, MinIO among others. Analytics platforms vary from simple Python & R based notebooks to Tensorflow to Spark, Presto to Splunk, Vertica and others. This case study will explain how California State University applied DataOps techniques in their current environments to create reusable, scalable and extensible data architectures. We will discuss strategies to build a data lakehouse architecture to rapidly scale and deploy use cases in your current environments. This case study is for you if... You want to learn how to apply scalable data architecture techniques in a data processing environment. You're a data Architect/ System Architect,...
    Note: Online resource; Title from title screen (viewed November 2, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    DDC: 005.74
    Keywords: Blockchains (Databases) ; Personal information management ; Electronic videos ; Chaînes de blocs ; Gestion d'informations personnelles ; Blockchains (Databases) ; Personal information management ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Healthcare providers spend billions of dollars annually on data management, yet provider directories often contain inaccuracies that dramatically increase the cost of care while reducing its quality. In response, Aetna, Humana, MultiPlan, Quest Diagnostics, and UnitedHealth Group have formed the Synaptic Health Alliance to explore the use of blockchain technology in tackling the challenge of accurate and efficient provider data management and sharing. Join us for this Case Study with UnitedHealthcare’s Meyrick Vaz to learn more about the Synaptic Health Alliance, better understand why it was founded, and explore the potential of blockchain for solving some of data management’s biggest challenges. You’ll examine the current state of provider data exchange as well as the goals, approach, and results of the initial pilot project for the alliance. Recorded on November 18, 2021. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned.
    Note: Online resource; Title from title screen (viewed November 18, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780136721246 , 0136721249
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 19 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 6+ Hours of Video Instruction Overview The AWS Certified Solutions Architect - Associate (SAA-C02) Complete Video Course is designed to provide users with more than 6 hours of instruction with the goal of fully preparing them for all aspects of the exam. The course walks through the exam objective coverage in a way that is easy to digest, apply in the workplace, and implement for the exam. The course instructor, Chad Smith, is an experienced and certified architect with a focus on AWS. The course provides walk-throughs of the exam objectives as well as best strategies and demonstrations for optimal application. Each lesson ends with two sample questions, which are explained in detail for both correct and incorrect answers. The four domains of the AWS SAA-C02 exam align with Modules 2 through 5 of this course to provide the best outcome for the learner intending to take—and pass—the AWS Certified Solutions Architect – Associate (SAA-C02) Exam. Topics include Module 1: AWS Certified Solutions Architect Overview Module 2: Design Resilient Architectures Module 3: Design High-Performing Architectures Module 4: Specify Secure Applications and Architectures Module 5: Design Cost-Optimized Architectures About the Instructor Chad Smith is the principal cloud architect at Brightkey.cloud. He is a certified architect for both Amazon Web Services and Google Cloud Platform and brings a wealth of relevant experience in cloud adoption, infrastructure design, data security, and cloud operations. Chad holds current AWS certifications in Architecture (Associate and Professional), SysOps, and Security. Skill Level Intermediate to advanced Learn How To Use architectural patterns to design resilient, highly available, and decoupled infrastructures Deploy high-performance compute, network, storage, and database resources Design least-privilege access control and secure application tiers, and deploy data protection mechanisms for encryption in transit and at rest Recognize cost-effective compute, network, storage, and database implementation Pass the AWS Certified Solutions Architecture Associate SAA-C02 exam Who Should Take This Course AWS architects AWS SysOps professionals AWS security professionals AWS developers and engineers Intermediate to advanced students Course Requirements Strong understanding of the AWS ecosystem and infrastructure architecture Working knowledge of commonly used AWS services such as EC2, S3, IAM, Cloudwatch, et...
    Note: Online resource; Title from title screen (viewed March 9, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson | Boston, MA : Safari
    ISBN: 9780136875185 , 0136875181
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 20 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Electronic videos ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. C++20 Fundamentals LiveLessons with Paul Deitel is a code-oriented presentation of C++, one of the world,Äôs most versatile and powerful programming languages. C++ remains hugely popular for the development of systems software, embedded systems, operating systems, real-time systems, communications systems and other high performance computer applications. C++20 Fundamentals LiveLessons is comprehensive and covers all major versions of C++, including: C++11, C++17, and C++20. The code repository for this LiveLesson is kept at https://github.com/pdeitel/CPlusPlus20FundamentalsLiveLessons and will be kept up to date as lessons are added and as changes are made.
    Note: Online resource; Title from title screen (viewed June 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780136823483 , 0136823483
    Language: English
    Pages: 1 online resource (1 video file, approximately 9 hr., 30 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 9 Hours of Video Instruction The Exam AZ-104 Microsoft Azure Administrator (Video) offers full coverage of the MS AZ-104 exam so you can learn everything you need to know to pass the exam. Coverage includes cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust, with the goal of passing the AZ-104 Exam. Description The Exam AZ-104 Microsoft Azure Administrator (Video) offers 9 full hours of video training on all core concepts in the AZ-104 exam so you can fully understand cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust. It will prepare Azure Administrators to implement, monitor, and maintain Microsoft Azure solutions, including major services related to compute, storage, network, and security. With 9 hours of hands-on demonstrations, it will provide the knowledge necessary to pass the exam and become Microsoft Certified: Microsoft Azure Administrator. With years of IT experience, numerous publications under his belt, and a wealth of expertise teaching in the field, Michael Shannon is uniquely qualified to prepare students for the Microsoft Azure Administrator AZ-104 exam. Topics include: Module 1: Manage Azure subscriptions and resources Module 2: Implement and manage storage Module 3: Deploy and manage virtual machines (VMs) Module 4: Configure and manage virtual networks Module 5: Manage identities About the Instructor Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT, he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, and Pearson, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He is the senior technical instructor for Skillsoft Corporation, specializing in all things cloud and security. Skill Level Intermediate/Advanced Learn How To Manage Azure subscriptions and resources Implement and manage storage Deploy and manage virtual machines (VMs) Configure and manage virtual networks Manage identities Who Should Take...
    Note: Online resource; Title from title screen (viewed June 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781801070676
    Language: English
    Pages: 1 online resource (1 video file, approximately 25 hr., 3 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; local ; Vidéo en continu ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: A compendium of SwiftUI code for any scenario from the blockbuster bestseller "SwiftUI for Masterminds" by J.D. Gauchat About This Video Delve into the framework and tools of SwiftUI Learn how to build applications for iOS and macOS with less code Get to grips with the techniques of declarative programming In Detail Do you want to learn the SwiftUI framework to build modern, stylish, and robust applications for Apple devices? This course will help you do that. The course starts with an introduction to the Swift language and gives you an overview of application development using Swift. Next, you will learn all about the fundamental concepts of Swift, such as operators, variables, functions, methods, strings, arrays, memory management, error handling, and a lot more. Moving along, you will get a solid understanding of the SwiftUI framework and the Xcode interface and learn how to use a declarative user interface. Next, you will learn to work with control views, navigation views, and lists. Moving ahead, you will learn to implement graphics, animations, gestures, and notifications in your applications. Next, you will understand how to manipulate data in your applications and in the cloud. Towards the end, you will learn to integrate the UIKit framework with SwiftUI and learn the steps to publish your application to the App Store. By the end of this course, you will be well versed with the SwiftUI framework and be able to implement it while developing applications for macOS and iOS.
    Note: Online resource; Title from title screen (viewed December 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 60 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video
    Abstract: You're working on a new product or project, or you’re trying to overhaul an existing one. You know you have to learn more about your customers—what problems they're trying to solve, their abilities and frustrations, and (most importantly) how they'll make the decision to buy—or not buy— your future product. This Learning Path will prepare you to conduct your first highly effective customer interview; you’ll learn how to create a “hypothesis,” how to get people to speak freely, how to best take notes on what they say, and how to share what you've learned with your team.
    Note: Online resource; Title from title screen (viewed March 30, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (258 pages)
    Edition: 1st edition
    Keywords: Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local
    Abstract: Environmental finance is about creating the greatest environmental benefit for the largest number of people at the lowest possible cost. That is the first and most important principle listed in Finance Policy for Renewable Energy and a Sustainable Environment . Focusing on what the author considers to be the 23 principles of environmental finance, this text examines the key financial principles necessary to build strategies and adopt policies to deal effectively with environmental challenges. The text encourages making financial decisions based on science, not politics, and considers what it takes to design and execute environmental finance programs in the most cost-effective way possible. Providing a historical overview of how we got to where we are now, and outlining the 23 principles needed to establish a stronger foundation for the future, this text presents the basic financial tools required to understand the concepts presented. It discusses the proper roles of grants, loans and guaranties, the concept and proper use of affordability, understanding leverage, and generating revenue streams for environmental programs. It also examines subsidies, financial risk reduction strategies, and the challenges posed by alternative energy as well as the next generation of environmental programs. As it relates to how environmental projects and improvements are achieved, Finance Policy for Renewable Energy and a Sustainable Environment outlines the greatest benefits at the lowest possible cost to the public. This text is an ideal resource for upper-level undergraduate students in environmental engineering and business courses, as well as practicing environmental engineers.
    Note: Online resource; Title from title page (viewed March 18, 2014) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781466562646 , 1466562641
    Language: English
    Pages: 1 online resource (295 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als
    Keywords: Forensic accounting ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Juricomptabilité ; États-Unis ; BUSINESS & ECONOMICS ; Infrastructure ; SOCIAL SCIENCE ; General ; Forensic accounting ; United States
    Abstract: Understanding the financial motivations behind white collar crime is often the key to the apprehension and successful prosecution of these individuals. Now in its second edition, Criminal Financial Investigations: The Use of Forensic Accounting Techniques and Indirect Methods of Proof provides direct instruction on the "how to" aspects of criminal financial investigations, taking readers through the different approaches used in gathering evidence and demonstrating how to present circumstantial evidence to a judge or jury in a simple and convincing manner. Simplifying how the financial pieces fit together, this text: Presents the logic and reasoning involved in constructing a financial criminal investigation Describes the requirements for legal acceptance of forensic accounting investigations Includes relevant examples of the step-by-step processes involved in financial investigations Explores the pitfalls—and how to avoid them—in financial investigating Contains two investigations with step-by-step procedures from initial inquiry to case completion—for use as term or topical assignments or to promote class discussion New Chapters in the Second Edition: What Is a Financial Investigation? Indirect Methods in Tax Investigations Unique Aspects of Criminal Tax Investigations Innovative Applications Written by a former Special Agent with the Criminal Investigation Division of the U.S. Internal Revenue Service, this volume sets out a successful methodology enabling readers to identify, pursue, and successfully prosecute financial white collar crime.
    Note: Online resource; Title from title page (viewed October 5, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9780429251306 , 0429251300 , 9780511324840 , 0511324847 , 9781439869147 , 1439869146 , 9781466514157 , 1466514159 , 9781439869123
    Language: English
    Pages: 1 online resource (430 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 363.25/968
    Keywords: Money laundering investigation ; Money laundering Prevention ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Blanchiment de l'argent ; Enquêtes ; États-Unis ; Money laundering investigation ; Money laundering ; Prevention ; United States
    Abstract: Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government's weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
    Note: Online resource; Title from title page (viewed December 19, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (470 pages)
    Edition: 1st edition
    Keywords: Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local
    Abstract: Despite all the controversy and hype that climate change has generated, there now exists an overwhelming body of scientific evidence that the problem is real and that its effects are already being felt on a global scale. Part of what makes this a volatile and controversial issue is that it is not just confined to the realms of the scientific community, nor does it have just one simple, predefined solution—it has multifaceted dimensions involving economic, sociological, political, psychological, and personal issues, making this a topic that affects every person on earth now and in the future. Connecting the dots, Climate Management Issues: Economics, Sociology, and Politics is the first book to propose a truly comprehensive solution to effectively deal with climate change in both the short and long term. It reaches across diverse sectors of society to link issues in climate change management and offer new insights into the complex interrelationships. As the author emphasizes, climate change extends far beyond the physical sciences to affect lifestyles, cultural values, political systems, economics, and health. An overview of the physical science of climate change gives readers a firm understanding of the concepts they need for policy and decision making, sociological applications, and community leadership. The book then focuses on multifaceted aspects such as international cooperation, journalistic balance, human psychology, international policy, national security, socioeconomic impacts, agricultural conservation, healthcare, the economics of mitigation, climate modeling, and error amplification. This timely volume puts on center stage those crucial ideas that are usually overlooked, misunderstood, or lost in media sensationalism. Enlightening and empowering readers, it looks at the decisions that must be made to mitigate climate change problems before irreversible damage is done.
    Note: Online resource; Title from title page (viewed December 14, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Productivity Press | Boston, MA : Safari
    ISBN: 9781420090611
    Language: English
    Pages: 1 online resource (248 pages)
    Edition: 2nd edition
    Series Statement: Finance professional collection
    Keywords: Managerial accounting ; Accountants ; Industrial management ; Electronic books ; local ; Comptabilité de gestion ; Comptables ; Gestion d'entreprise ; accountants ; BUSINESS & ECONOMICS / Management Science ; BUSINESS & ECONOMICS / Quality Control ; BUSINESS & ECONOMICS / Industries / Manufacturing Industries ; Accountants ; Industrial management ; Managerial accounting ; Commerce ; Business & Economics ; Accounting
    Abstract: The first edition of Brian Maskell‘s now classic work proved that when given the chance, accountants would prefer not to serve out their working days as number crunching automatons. With its energetic tone and common sense approach, the book inspired numbers people at all levels to become true allies in their companies lean revolutions. It enco
    Note: Online resource; Title from title page (viewed June 18, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 0738495603
    Language: English
    Pages: 1 online resource (356 pages)
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Abstract: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...