Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (5,225)
  • NetLibrary, Inc  (3,993)
  • Därr-Expeditionsservice  (787)
  • Packt Publishing,  (445)
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835464694 , 1835464696
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Software architecture ; Python (Computer program language) ; Interfaces de programmation d'applications ; Architecture logicielle ; Python (Langage de programmation) ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers a detailed exploration of FastAPI, a cutting-edge Python framework for API development. The course starts with basic API and REST principles, quickly advancing to practical application for a thorough understanding of both theory and practice. The curriculum progresses logically, starting with the basics of FastAPI, including app setup, API routing, linting, and formatting. Participants will create a social media API, manage post and comments, and learn code organization with APIRouter, followed by practical testing experience using pytest. A significant portion of the course focuses on asynchronous databases, vital for scalable application development. It covers database setup, connection, and integration within FastAPI. The course also delves into Python logging techniques, crucial for debugging and monitoring FastAPI applications. It also covers user authentication, an essential element in modern web apps. It includes practical training on JWTs, password hashing, authentication management, and database user relationships, alongside addressing many-to-many database relationships and user email confirmation strategies. In later stages, the course addresses advanced topics like file uploads, background image generation tasks, and deployment methodologies, including continuous integration with GitHub Actions. What you will learn Build and structure a FastAPI application Implement and test RESTful APIs with FastAPI Manage asynchronous database operations Configure and utilize Python logging in FastAPI Secure applications with user authentication and JWTs Handle complex database relationships Deploy FastAPI applications and manage them effectively Audience This course is ideal for aspiring back-end developers, testers looking to integrate automation into their workflows, and front-end developers seeking a deeper understanding of server-side processes. This course will particularly benefit those with a basic grasp of programming and a desire to specialize in the fast-paced realm of web development, API construction, and database management using FastAPI. Prior programming experience in any language is recommended; beginners should consider a basic Python course first, as all required software is provided for free. About the Author Jose Salvatierra Fuentes: Jose, a passionate educator in the realm of coding and software development, has dedicated over 7 years to teaching online. He founded Teclado with a vision to democratize software development education, striving to ensure comprehensive understanding for his students. His approach makes learning coding a clear, rewarding journey, connecting the dots that once seemed obscure. Specializing in Python and JavaScript, Jose excels in web and backend development. He's proficient in various libraries and frameworks, including Flask, React, React Native, and AngularJS. His expertise extends to working with UNIX systems, MongoDB, PostgreSQL, and crafting advanced system architectures. Jose's commitment is to make the learning process both efficient and enjoyable, guiding students to mastery in software development.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886922 , 1835886922
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into Cisco's networking environment, covering foundational concepts such as network component roles and the Cisco CLI. It progresses through network topology, IPv4 and IPv6 addressing, and essential networking principles like virtualization, wireless configurations, and switch functionalities. The course is designed to build a comprehensive understanding of network infrastructure and cybersecurity basics. Focusing on practical applications, you will gain hands-on experience in configuring and managing Cisco networks. The course emphasizes VLAN configuration, Interswitch connectivity, routing protocols, and network security implementations. Through real-world scenarios, you will explore DHCP, NTP, and DNS in network management, alongside configuring static and dynamic routing, understanding ACLs, and navigating network address translation. The course concludes with advanced topics in network management and security. The course also introduces network management automation, SDN architecture, and REST-based APIs application. This course will ensure you are well-equipped for intermediate to advanced roles in network administration and security, with a robust skill set for navigating complex networking environments. What you will learn Understand network component roles and functions Analyze different network topology characteristics Configure IPv4 and IPv6 addresses on devices Gain insights into wireless configuration and security Learn routing components and packet forwarding techniques Implement network security through ACLs and NAT Audience This course is ideal for aspiring network administrators, IT professionals, and students seeking foundational knowledge in networking. This course is perfect for those preparing for the Cisco CCNA (200-301) certification, aiming to acquire a comprehensive understanding of network security, protocols, and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887288 , 1835887287
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Six sigma (Quality control standard) ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Six Sigma
    Abstract: The course begins with a comprehensive introduction to Lean Six Sigma, laying a solid foundation in process improvement basics and key concepts. You'll explore Lean Six Sigma metrics, core methodologies, and the Seven Tools of Quality, building a strong understanding of process optimization. The course focuses on practical skills and tools, including the DMAIC Model (Define, Measure, Analyze, Improve, Control), important graphs and charts, and real-world applications. You'll learn to identify and eliminate waste, understand customer requirements (CTQs), and optimize processes for better quality and efficiency. As you progress, the course covers advanced topics like process control, root cause analysis, and statistical analysis techniques. You'll gain hands-on experience applying Lean Six Sigma principles to real projects, making data-driven decisions, and achieving tangible improvements. The course wraps up with a review of key concepts and a practical guide to implementing Lean Six Sigma methodologies in your organization. By the end, you'll be well-equipped to earn your Green Belt certification and drive process excellence in any industry. What you will learn Learn Process Improvement with Lean Six Sigma Apply DMAIC methodology for effective problem-solving Utilize the Seven Tools of Quality for defect reduction Understand core Lean Six Sigma concepts and terms Analyze data and identify opportunities for process optimization Implement statistical tools and techniques for quality improvements Audience This course is ideal for professionals seeking to enhance their process improvement skills and earn a Lean Six Sigma Green Belt certification. A basic understanding of business processes is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Cherokee Boose: Cherokee started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880760 , 1835880762
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.15/5
    Keywords: Risk management ; Information technology Security measures ; Gestion du risque ; Technologie de l'information ; Sécurité ; Mesures ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The NIST 800-37 Risk Management Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology to assist organizations in managing and mitigating information security risks effectively. It provides a structured approach to risk management, emphasizing continuous monitoring and a lifecycle process for securing information systems. The NIST 800-37 Risk Management Framework (RMF) guides organizations through a systematic risk management process. It begins with "Prepare" to establish context and allocate resources, followed by "Categorize" for classifying information systems. The subsequent steps include "Select Controls" to tailor security measures, "Implement Controls" to put them into practice, "Assess Controls" for effectiveness evaluation, "Authorize" for system approvals, and "Monitor" for continuous oversight and response to changes in the information system's environment. Upon completion, you will possess a clear understanding of the framework principles and components. Armed with this knowledge, navigate the risk management lifecycle with confidence. You will gain proficiency in identifying, assessing, and prioritizing risks, selecting and implementing security controls, and ensuring continuous monitoring and authorization aligned with industry best practices. What you will learn Understand core principles and significance of NIST 800-37 RMF Learn methodologies for risk identification and prioritization Choose and implement controls based on organizational risk Assess implemented controls and identify vulnerabilities Grasp the steps to grant system and information authorizations Integrate NIST 800-37 RMF with other compliance frameworks and standards Audience The course is tailored for cybersecurity professionals, including risk managers, information security officers, compliance officers, IT and security managers, and risk assessment professionals. Geared toward individuals with a foundational knowledge of cybersecurity, the course equips you with skills to navigate the risk management lifecycle. You will gain proficiency in risk identification, assessment, and prioritization, and implementation of security controls. The course addresses RMF integration with compliance frameworks for those overseeing regulatory compliance within organizations. About the Author Alexander Oni: Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886281 , 1835886280
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Scrum (Computer software development) ; Agile software development ; Continuous improvement process ; Scrum (Développement de logiciels) ; Méthodes agiles (Développement de logiciels) ; Amélioration continue ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a comprehensive journey into Scrum and Agile project management in our course. Starting with foundational principles, we move on to advanced concepts, guiding you through effective project management with Scrum. Furthermore, gain insights into orchestrating Scrum Teams, exploring the nuances of running projects with Scrum, and understanding key Scrum concepts. Moving on, you will immerse yourself in the dynamic flow of Scrum Events and equip your toolkit with essential platforms using our Scrum Toolkit series. Next up, explore popular tools such as Jira, Microsoft Teams, Microsoft Planner, and the newly introduced Trello. Stay ahead with the latest trends by incorporating ChatGPT into Scrum Teams for optimization and productivity, a cutting-edge dimension unveiled in our course. As you progress through the course, witness Scrum in practice, honing your skills through practical applications. With high-quality video lectures, downloadable handouts for quick reference, and engaging quizzes, this course provides a dynamic and interactive educational experience. By the end of the course, you will have a solid grasp of Scrum and Agile project management. You will be well-versed in the Scrum culture, proficient in managing projects using Scrum methodologies, and skilled in running projects with Scrum Teams. What you will learn Learn to apply Scrum for project success Explore how to deliver business value through Scrum Accelerate project delivery by understanding Scrum Master diverse Scrum concepts for effective implementation Explore proficiency in utilizing Scrum tools Understand the depth of Scrum values, principles, and pillars Audience This course is tailored for diverse audiences, including beginners exploring Scrum and those seeking certification. Ideal for project managers, developers, business analysts, architects, designers, and managers, it covers foundational to advanced Scrum concepts. Whether you are starting your Scrum journey or aiming to enhance existing skills, this course provides valuable, concise, and flexible learning experiences for successful Scrum adoption in various professional roles. About the Author YESI EDUCATION: Mauricio Rubio Parra is an Agile Guru and the founder of YESI EDUCATION. In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. YESI EDUCATION is a global online education business with over 100 products that reach more than half a million students in over 200 countries. Their portfolio of products includes online courses, eBooks, audiobooks, newsletters, apps, podcasts, and other educational resources such as templates. YESI is formally incorporated and headquartered in Sydney, Australia, and has three main divisions: education, property and invest. YESI, founded in 2016, has a strong focus on passive income generation and wealth creation. The company constantly explores new revenue streams, disruptive and innovative technologies as well as investment opportunities and new products within its three divisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887080 , 1835887082
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/4
    Keywords: Computer software Testing ; Automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing and comparing Cypress with Selenium, emphasizing Cypress's architectural advantages in automation. It guides you through tool installation across various operating systems and dives into Cypress's setup, test runner, and structure, laying a solid foundation for your journey in automation. Beyond setup, the course dives into Cypress automation, covering syntax, locator strategies, selector playground, CSS selectors, and XPath use. It enhances your grasp of Cypress commands, including chaining and handling child elements, and contrasts Cypress's asynchronous nature with synchronous operations, guiding you in promise handling. You'll explore Cypress assertions, including implicit, explicit, and common types used in testing. The course emphasizes interactive web UI elements, teaching interaction techniques with checkboxes, dropdowns, and mouseover events, and covers element list handling with loops and iterations. Additionally, learn to navigate through windows, tabs, popups, and frames, and address common challenges while building a strong framework. The course thoroughly covers the POM, environment variables, and experimental features. It also delves into API testing and automation, along with practical sessions on Git, GitHub, Jenkins, and advanced CSS selectors. What you will learn Understand Cypress architecture and how it compares with Selenium Understand the asynchronous nature of Cypress and handle promises Conduct both implicit and explicit assertions in testing Interact with web UI elements like checkboxes, dropdowns, and mouseover events Perform API automation with Cypress Integrate and manage Jenkins for continuous integration Audience Ideal for a wide range in software testing, this course benefits QA professionals and manual testers transitioning to automation, enhances skills, aids fresh graduates in software engineering, and offers QA Team leads and Managers insights into automation tools and best practices. Perfect for all levels in the QA and testing field. No prior automation or coding experience required; course suitable for beginners with JavaScript concepts included. Requires only a Windows/MAC computer and a browser (Firefox or Chrome). About the Author Let's Kode It : Let's Kode It is here with a mission to teach everyone a new skill--doing what they have always wanted to do. They are a group of software professionals with more than 10 years of expertise in different areas of software industries and working as team leads in multinational companies. All their instructors have master's degrees from reputed universities. Their expertise lies in various fields of Software Development Life Cycle (SDLC)--from application development and testing to system administration. Be it programming or creating a professional-looking MS Word document, they believe anyone can code and that coding is not something out of this world. Their goal is to offer high-quality technology courses, which will suit a newbie as well as an intermediate.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463444 , 1835463444
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Web site development Computer programs ; Application software Development ; Python (Computer program language) ; Sites Web ; Systèmes-auteur ; Logiciels d'application ; Développement ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Next.js is a popular open-source JavaScript framework designed to make web development with React efficient and scalable. Next.js adds layers of abstraction to React and simplifies the process of building modern web applications. It provides a set of conventions and features that enhance the development experience, making it easier to create performant and SEO-friendly applications. This comprehensive Next.js course unfolds by beginning with an introduction to web development fundamentals, as it progresses through React basics, advanced Next.js concepts, and real-world deployment strategies. We will explore key topics such as server-side rendering (SSR), client-side rendering (CSR), static site generation (SSG), and incremental static regeneration (ISR). The course offers hands-on experience with a final project, covering everything from structuring applications to optimizing for performance and SEO. The modular format accommodates varying skill levels, ensuring a well-rounded and practical learning experience for all learners. Upon completion of this Next.js course, you will become proficient in web development fundamentals, React essentials, and advanced Next.js concepts. Through hands-on experience, master server-side rendering, client-side rendering, dynamic routing, and performance and scalability in real-world scenarios. What you will learn Master SSR, CSR, and SSG for optimized web development Explore React basics and advanced component development in Next.js Implement Next.js best practices for efficient and scalable web applications Learn to create dynamic routes for versatile content handling Deploy fully functional applications using Vercel and Git/GitHub workflows Enhance applications for search engines and social platforms through metadata and SEO practices Audience This Next.js course is tailored for a diverse audience, catering to both entry-level and seasoned developers. Ideal for junior developers, it provides a strong foundation in web development fundamentals, React basics, and advanced Next.js concepts. Intermediate developers can enhance their skills and gain mastery in the latest features of Next.js. Senior web developers seeking to stay updated with modern concepts will find valuable insights for optimizing web applications. No programming experience is required, but basic web development and JavaScript understanding is desirable for the course. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465578 , 1835465579
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: React (Electronic resource) ; Web site development ; Web applications Programming ; Sites Web ; Développement ; Applications Web ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the course, your gateway to mastering Recoil for React web development. Recoil, a powerful state management library by Facebook, revolutionizes app development with its simplicity and scalability. In this course, you will delve into Recoil's fundamentals, understanding why it's favored over Redux, and how it enhances React applications. Starting from scratch, you will learn to configure and use Recoil atoms and selectors, persist state data efficiently, and leverage advanced features like atom families. Embrace the transition from junior to senior developer by mastering Recoil's complexities, refining skills for scalable web and mobile applications, and acing declarative JavaScript solutions for interviews. Throughout the journey, you will build an app, progressing from the basics to advanced topics. Explore Recoil's nuances as we deep-dive into selector functionalities, state persistence mechanisms, and crafting performant logic for complex applications. By the end of this course, you will be equipped with a deep understanding of Recoil, confidently implementing scalable and high-performance state management in React applications. What you will learn Grasp Recoil's principles for popular state management Craft UI elements for better user interaction with Recoil Implement dynamic search filters with Recoil tools Persist data across sessions using recoil-persist Transition local to global state management through Recoil Build scalable state logic using advanced Recoil features Audience This course caters to a diverse audience, spanning junior to senior React developers eager to bolster their skill set. Beginners seeking a strong foundation in React and Recoil, intermediate developers aspiring to refine scalable code, and seasoned professionals keen on staying updated with modern industry requirements will all find immense value. Basic knowledge of JavaScript and React is recommended, but not mandatory, ensuring accessibility for learners at varying proficiency levels. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883907 , 1835883907
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Artificial intelligence ; Apprentissage automatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is an innovative course tailored for those who aspire to master the dynamic fields of computer vision and generative artificial intelligence. This course offers a deep dive into the world of image recognition, object detection, and the magic of generative AI using tools like KerasCV, Python, TensorFlow, PyTorch, and JAX. This course guides you from the fundamentals of image classification to the intricacies of object detection, starting with the KerasCV library for deep learning. You'll learn to effectively use and fine-tune pre-trained models, create custom datasets for object detection, using tools like the LabelImg GUI program, and apply these skills to tackle real-world challenges. A key focus is the generative AI segment, particularly on Stable Diffusion, where you'll learn to generate detailed images from text, unlocking your creative potential in this advanced AI domain. This course offers a progressive learning path from basic concepts to advanced techniques, catering to both professional development and creative pursuits in AI. By the end, you'll have the confidence and tools needed for a variety of applications in the ever-evolving field of generative artificial intelligence. What you will learn Harness the power of the KerasCV library for efficient deep learning Master image classification techniques using pre-trained models Implement object detection in real-world scenarios Fine-tune models for tailored applications and datasets Create custom object detection datasets with LabelImg Understand the integration of TensorFlow, PyTorch, and JAX in computer vision Audience This course is ideal for individuals ranging from beginners to advanced learners who possess a fundamental understanding of machine learning and Python programming. It is especially beneficial for those keen on delving into the realm of computer vision using KerasCV. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 9781835883549 , 1835883540
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This in-depth masterclass provides end-to-end coverage of developing enterprise-grade LLMs tailored to your unique use cases. Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. You'll learn how to make crucial architecture decisions, select optimal model types, configure hyperparameters, and curate quality training data. Discover professional techniques for pre-training, iterative fine-tuning, and rigorous model evaluation. The instructors reveal insider strategies to productionize your LLMs smoothly, monitor them proactively, and maintain optimal performance post-deployment. Following a structured curriculum spanning the complete LLM lifecycle, this masterclass empowers you with hands-on skills to build, refine, and deploy large language models with confidence. Turbocharge your generative AI initiatives and get the practical knowledge needed to create LLMs that solve complex challenges for your organization. What you will learn How to select the right LLM architecture for your use case Approaches for sourcing, cleaning, and labeling quality training data Pre-training methods and hyperparameter optimization Advanced fine-tuning techniques to boost performance Ways to thoroughly evaluate LLMs before deployment Best practices for monitoring, updating, and maintaining production LLMs Audience Data scientists, machine learning engineers, and AI developers seeking an in-depth understanding of large language model (LLM) development. This masterclass is designed for professionals aiming to build, optimize, and deploy enterprise-grade LLMs tailored to specific use cases, with a focus on practical skills and real business impact. About the Authors Maxime Labonne: Sr. Machine Learning Scientist, JPMorgan. Denis Rothman: Expert in AI Transformers including ChatGPT/GPT-4, Bestselling Author. Abi Aryan: ML Engineer and Author.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881668 , 1835881661
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides a comprehensive exploration of Cisco Firewall and IPS systems, optimized for deployment within the AWS ecosystem. It commences with a foundational overview, catering to both novices and seasoned professionals. Beginning with AWS Virtual Private Cloud (VPC) configuration, you'll establish the foundation for building secure network infrastructures. The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. You'll master the Next-Generation Firewall virtual (NGFWv) deployment within AWS, bolstering your ability to safeguard networks against evolving cyber threats. Hands-on labs and practical exercises are integrated to impart real-world skills in configuring, troubleshooting, and securing Cisco Firewall and IPS systems. You'll gain expertise in risk management, report generation, and effective troubleshooting techniques. By course completion, you'll be well-prepared for Cisco CCNP Security SNCF (Exam 300-710), poised to excel in the realm of cybersecurity. What you will learn Configure AWS VPC for Cisco Firewall and IPS systems Deploy and manage FMCv and NGFWv in AWS Implement NGFW Routed and Transparent modes Explore multi-instance deployments and clustering Troubleshoot using CLI/GUI and perform packet capture Enhance security with Cisco AMP and other integrations Audience This course is ideal for cybersecurity professionals and network administrators looking to advance their skills in Cisco Firewall and IPS systems. A basic understanding of networking concepts and AWS is preferred. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886649 , 1835886647
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Computer science Mathematics ; Apprentissage automatique ; Informatique ; Mathématiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course starts with an introduction to the key concepts and outlines the roadmap to success in the field. You'll begin by understanding the foundational elements of matrix and vector derivatives, exploring topics like linear and quadratic forms, chain rules in matrix form, and the derivative of determinants. Each concept is reinforced with exercises, ranging from quadratic challenges to least squares and Gaussian methods. The course progresses into optimization techniques essential in data science and machine learning. Delve into multi-dimensional second derivative tests, gradient descent in one and multiple dimensions, and Newton's method, including practical exercises in Newton's Method for least squares. An additional focus is set on setting up your environment, where you'll learn to establish an Anaconda environment and install crucial tools like Numpy, Scipy, and TensorFlow. The course also addresses effective learning strategies, answering pivotal questions like the suitability of YouTube for learning calculus and the recommended order for taking courses in this field. As you journey through the course, you'll transition from foundational concepts to advanced applications, equipping yourself with the skills needed to excel in data science and machine learning. What you will learn Understand matrix and vector derivatives Master linear and quadratic forms Apply the chain rule in matrix calculus Solve optimization problems using gradient descent and Newton's method Set up the Anaconda environment for machine learning Install and use key libraries like Numpy and TensorFlow Develop effective strategies for learning calculus in data science Audience This course suits students and professionals eager to learn the math behind AI, Data Science, and Machine Learning, ideal for deepening knowledge in these advanced technology fields. Learners should have a basic knowledge of linear algebra, calculus, and Python programming to effectively understand matrix calculus. A keen interest and enthusiasm for exploring this intricate subject are also crucial for a fulfilling learning experience. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462935 , 1835462936
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course not only equips you with the skills to write more efficient and effective scripts but also introduces you to the world of graphical scripting, allowing you to create visually interactive scripts that enhance user experience. From basic text-based menus to sophisticated graphical interfaces using dialog and its widgets, the course offers a comprehensive look at elevating command-line scripts to GUI-based applications, making your scripts more accessible to a wider audience. The exploration doesn't stop there; advanced sed techniques await, revealing the potential within multi-line commands and the intricacies of command negation for complex text processing challenges. Meanwhile, the dive into advanced gawk programming unveils the art of variable management, array handling, and the implementation of structured commands, further broadening your scripting capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835886007 , 1835886000
    Language: English
    Pages: 1 online resource (1 video file (34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: UNIX Shells ; Computer networks Security measures ; Data encryption (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835885567 , 183588556X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with the basics of terminals and shells, setting the foundation for interaction with Linux at a fundamental level. It progresses to cover essential commands for navigating the filesystem and managing files, ensuring students can efficiently organize and manipulate data within the Linux environment. The journey continues through advanced topics such as process management, storage optimization, and package management across Debian and Red Hat systems, ensuring a well-rounded skill set. The course focuses on practical skills, including installing software from source, navigating text editors like vi, vim, and nano, and managing environment variables and file permissions. It emphasizes the importance of these skills in real-world scenarios, illustrating how they contribute to effective system administration and development practices. The course wraps up by exploring file systems, locating files, and utilizing other useful commands that streamline daily tasks. By the end of this course, students will have navigated through the most significant aspects of the Linux command line, equipped with the knowledge to apply these skills in a professional setting.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835464359 , 1835464351
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Penetration testing (Computer security) ; Sécurité informatique ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a solid foundation in Access Control and Password Management, setting the stage for a deep dive into the intricacies of cybersecurity. It progresses into exploring Active Defense mechanisms and the development of effective Contingency Plans, ensuring you're prepared for any security incident. The journey continues with an exploration of Critical Controls, Basic and Advanced Cryptography, ensuring a well-rounded understanding of key security principles. The course focuses on laying out a Defensible Network Architecture, Endpoint Security, and enforcing Windows and Linux security, providing a detailed look at how to secure modern operating systems and their networks. Through practical examples, you'll learn about Incident Handling and Response, IT Risk Management, and the importance of Security Policies and Virtualization for a robust cybersecurity posture. The course wraps up by covering Web Communication Vulnerabilities, Vulnerability Scanning, and Penetration Testing techniques, equipping you with the skills to identify and mitigate potential threats effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835887042 , 183588704X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer networks Security measures ; Client/server computing ; Web servers ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Architecture client-serveur (Informatique) ; Serveurs Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885628 , 1835885624
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Python (Computer program language) ; Intelligence artificielle ; Python (Langage de programmation) ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative learning experience with 'Master ChatGPT and OpenAI APIs By Building AI Tools in Python.' This immersive course takes you from the basics of ChatGPT and OpenAI's potent APIs through a journey of building dynamic AI-powered tools. Discover the magic behind ChatGPT's conversational prowess and dive deep into the neural networks and transformers that make it tick. You'll start by creating and managing your ChatGPT account, understanding the model's anatomy, and grasping the limitations and capabilities of AI language models. Transitioning from theory to hands-on practice, the course guides you through content creation, code generation, and the intricacies of prompt engineering. Moreover, you'll venture into the realms of generative AI with Midjourney, craft AI-driven applications, and harness the synergy of OpenAI and DALL-E for on-the-fly image generation. This course demystifies the AI concepts crucial in today's technology landscape, providing you with the skills to innovate and excel in the burgeoning field of AI. What you will learn Navigate the foundational elements of ChatGPT and OpenAI APIs Generate creative content and code with ChatGPT's language model Design and implement AI applications with user-friendly interfaces Master the art of prompt engineering for optimized AI interactions Build AI-powered tools and images using OpenAI and DALL-E Develop secure, intelligent applications with advanced Python techniques Audience This course welcomes everyone from entrepreneurs to artists and developers, aiming to learn about cutting-edge AI technologies and build AI-powered applications. Basic programming knowledge is preferred but not mandatory, making this course accessible to a wide range of learners. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883440 , 1835883443
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. What you will learn Secure passwords with best practices Conduct safe data disposal protocols Navigate networks with safety measures Identify various forms of malicious software Apply defenses against software threats Adopt proactive cyber hygiene habits Audience This course is ideal for individuals looking to bolster their digital security acumen. Tailored for users who wish to protect their online presence against evolving cybersecurity threats. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633074 , 183763307X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the foundational elements of Linux Shell Scripting, guiding you through basic script building and the use of variables to automate repetitive tasks efficiently. As the course progresses, it focuses on more complex concepts such as redirection, arithmetic operations, and conditional statements, enhancing your scripting skills for real-world applications. Through practical examples, you'll learn how to craft scripts that solve problems, automate tasks, and streamline your workflow. The course wraps up by delving into advanced topics such as loops, user input handling, and script control, equipping you with the knowledge to write sophisticated scripts. By the end of this course, you'll have a solid understanding of Linux Shell Scripting, enabling you to leverage its capabilities to optimize and automate your Linux environment. What you will learn Craft basic to advanced shell scripts Automate tasks using shell scripts Implement conditional logic in scripts Create loops for repetitive tasks Control script flow and execution Optimize Linux tasks through scripting Audience This course is ideal for IT professionals, system administrators, and developers looking to automate and optimize their Linux environments. Basic knowledge of Linux commands is required. Perfect for those aiming to enhance their scripting skills for efficiency. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889848 , 1835889840
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey into the world of 3D design with our comprehensive Blender 4 Geometry Nodes course. Designed for beginners, this course covers everything from setting up your Blender project to mastering the intricacies of Geometry Nodes for creating stunning 3D models. You'll start with the basics, learning how to manipulate grid meshes and transform them into complex staircase designs. As you progress, the course introduces you to advanced techniques for railing construction, pole support creation, and optimizing your models for efficiency and precision. This hands-on approach is complemented by lessons on mesh manipulation, dynamic staircase shaping, and advanced node group creation, ensuring a comprehensive understanding of 3D modeling techniques. Whether your interest lies in game art, architectural visualization, or digital artistry, this course equips you with the skills to bring your imaginative concepts to life. By understanding the importance of each concept, you'll be able to apply these skills across various projects, enhancing your portfolio and opening up new career opportunities. What you will learn Navigate and utilize Blender 4's interface effectively. Understand and apply geometry node basics for 3D modeling. Design and manipulate grid meshes with curve length density. Transform 2D planes into 3D staircase models seamlessly. Create scalable controls and ensure uniformity in stair steps. Construct complex geometry node groups for detailed modeling. Audience This course welcomes everyone from beginners with no prior experience in Blender or 3D modeling to those looking to enhance their skills. It is ideal for beginners, aspiring artists, architects, digital creators, game developers, and educators eager to master 3D modeling with Blender 4's geometry nodes. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835883525 , 1835883524
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins by introducing you to the basics of terminals and shells, laying a solid foundation for command line proficiency. It methodically progresses through executing commands, offering three parts to ensure a thorough grasp of command functionalities and nuances. The course focuses on enhancing your Linux skills further with detailed explanations on filesystem management, permissions, and file editing with Vi, ensuring you can navigate and manipulate the Linux environment with ease. It covers essential topics such as finding files, managing processes, and executing scripts, providing you with the tools needed to optimize and automate your Linux tasks. The course wraps up by delving into advanced programming constructs, presented in two comprehensive parts to solidify your scripting and automation capabilities. Each section is designed to build on the previous, ensuring a seamless learning curve from beginner to advanced techniques. By the end of this course, you will have learned the art of leveraging Linux for powerful, efficient computing, making you an invaluable asset in tech-driven environments.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835888728 , 1835888720
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Cloud computing ; Systèmes d'exploitation (Ordinateurs) ; operating systems
    Abstract: The course begins with an in-depth look at Linux's capabilities as a KVM host and guest, establishing a strong foundation in virtualization technology essential for modern cloud computing. Through hands-on examples, you'll learn how to efficiently set up and manage virtual machines, paving the way for more advanced cloud-based applications and services. Following this, the course delves into the practical steps for creating and configuring EC2 instances within Amazon Web Services (AWS), demonstrating the power and flexibility of cloud resources. You'll gain insights into selecting the right instance types for your projects, optimizing performance, and managing security settings to protect your cloud infrastructure. The journey continues with detailed instructions on deploying and fine-tuning Azure Virtual Machines (VMs). This section emphasizes the similarities and differences between Azure and AWS, equipping you with the knowledge to make informed decisions based on project requirements and cloud provider strengths. The course then shifts focus to containerization with Docker, highlighting Linux's role as both a host and a container platform. The course wraps up by reinforcing the learner's ability to navigate the complex landscape of cloud computing with Linux, from virtual machines to containerization.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462997 , 1835462995
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence Study guides Examinations ; Microsoft Azure (Computing platform) Study guides Examinations ; Intelligence artificielle ; Examens ; Guides de l'étudiant ; Microsoft Azure (Plateforme informatique) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Azure AI with our meticulously crafted video course, tailored to empower you with a thorough understanding of artificial intelligence fundamentals and its practical applications in the cloud. This course begins with an introduction to the AI-900 exam contents, guiding you through what to expect and how to prepare effectively. As you progress, you'll explore the distinctions between artificial intelligence, machine learning, and data science, and delve into common AI workloads, including machine learning and anomaly detection. The course also covers the application of AI within Microsoft Azure, addressing challenges, risks, and the principles of responsible AI use. Through detailed video content, you'll learn about Azure Machine Learning, Cognitive Services, and how to apply computer vision and natural language processing to solve real-world problems. The course culminates in practical advice on preparing for the AI-900 exam, featuring example questions and strategies for success. Whether you're a beginner or looking to solidify your knowledge, this course will take you on a journey from foundational concepts to advanced applications, ensuring you're well-prepared for the AI-900 certification.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835467503 , 1835467504
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by laying a solid foundation with an overview of capacity planning, ensuring you understand how to measure and optimize system resources effectively. It then dives into the technicalities of monitoring CPU, memory, disk, and network activity, crucial for maintaining system health and performance. The course focuses on deepening your understanding of Linux's core, including kernel components, modules, and the intricacies of compiling a kernel. You'll learn how to monitor and manage the kernel for peak efficiency, alongside exploring systemd and SysV init systems for better process management. Additionally, system recovery techniques, fstab configuration, and managing swap partitions are thoroughly covered to ensure system resilience. The course wraps up with practical skills in managing storage solutions, network configurations, and troubleshooting, alongside essential system administration tasks such as installing programs from source and effective backup strategies.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835465462 , 1835465463
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: Web site development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Dive into the freelancing world with this course that bridges the theoretical and practical aspects of web development. This course is designed for aspiring freelancers and seasoned developers looking to expand their skill set with hands-on, project-based learning. You will embark on a journey to build a fully functional website for a surfcamp, complete with an integrated, customizable blog and sign-up forms, using NextJS and Strapi. This course stands out by focusing on real-world projects, avoiding generic examples and diving deep into the synergy of NextJS and Strapi for a flexible design and seamless developer experience. Learn how to deliver websites to clients who lack coding skills, allowing them to update content directly, rivaling the convenience of platforms like WordPress, Squarespace, and Wix with the power of a Headless CMS. From design to deployment, you will transform Figma designs into live sites, mastering the art of a seamless design-to-development workflow. With over 12 hours of content, the curriculum introduces new concepts at a comfortable pace, ensuring a comprehensive understanding of each element.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835883600 , 1835883605
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Computer science ; Systèmes d'exploitation (Ordinateurs) ; Informatique ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Linux, offering insights into its importance and widespread use in today's tech-driven world. You'll learn why Linux is the backbone of many servers, devices, and systems, and how its open-source nature fosters innovation and customization. The course focuses on choosing a Linux distribution, guiding you through the myriad of options available and helping you select the one that best fits your needs. This segment is crucial for understanding the diversity within the Linux ecosystem and how it caters to different user preferences and requirements. Next, we delve into choosing a desktop environment, emphasizing the significance of the user interface in your day-to-day interaction with Linux. You'll explore popular desktop environments, their features, and how to select one that aligns with your usability and aesthetic preferences. The course wraps up with a detailed walkthrough on installing software on Linux, covering various package managers and installation methods. This section is designed to equip you with the skills to extend the functionality of your Linux system and customize it to your liking.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884904 , 1835884903
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics
    Abstract: The course embarks on a journey through the enchanting world of stylized 3D tavern modeling with Blender 4, starting from the foundational basics and resource pack overview to the sophisticated realms of advanced modeling, texturing, and lighting techniques. Through a series of meticulously crafted lessons, you'll learn to navigate Blender's interface, utilize geometry nodes for creative expression, and employ greyboxing for efficient layout planning. As the course progresses, you will dive deeper into the art of texturing, where wood shaders and stone supports bring your taverns to life with remarkable realism. You will also explore the structural integrity of wooden frameworks, intricate window designs, and the subtleties of lighting that illuminate your creations in a stylized yet realistic manner. The course concludes by teaching you rendering techniques that showcase your taverns in their best light, ensuring your skills are polished for any 3D design challenge. With a focus on both the technical and artistic sides of Blender, this course is your gateway to transforming imaginative concepts into stunning visual stories. What you will learn Initiate projects with Blender fundamentals Employ 3D modeling strategies for taverns Utilize geometry nodes for creative design Implement greyboxing for layout efficiency Apply advanced texturing for realism Design structural elements and frameworks Audience This course is ideal for 3D artists and designers eager to specialize in stylized model creation. Familiarity with basic 3D concepts is beneficial. This course is perfect for those looking to enhance their skills in Blender for professional or personal projects. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885703 , 1835885705
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the fundamentals of penetration testing, distinguishing the roles of pentesters - the good, the essential, and the challenges they face. It lays the groundwork with pre-engagement essentials, including data security agreements and crafting a detailed Statement of Work (SOW), ensuring clarity and legal safeguarding before any testing begins. The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. It emphasizes the importance of maintaining access, covering tracks, and preparing comprehensive deliverables to ensure actionable insights for enhancing security. The course wraps up by exploring personal engagement toolkits and pentesting platforms, providing practical knowledge for effective pentesting. It also touches upon blue team pentesting, highlighting the collaborative effort required in cybersecurity to protect against threats. What you will learn Plan and execute effective penetration tests Perform detailed reconnaissance and vulnerability scans Exploit vulnerabilities to assess security posture Maintain unauthorized access discreetly Execute strategies to conceal testing activities Produce comprehensive security assessment reports Audience This course is ideal for IT professionals, cybersecurity enthusiasts, and ethical hackers seeking to enhance their pentesting skills. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Brad Stine: Brad Stine is the Chief Information Security Officer at Semper Sec with years of experience in security architecture. Throughout his career, Brad has played a key role in the development and delivery of technology-driven business solutions, including projects centered around cloud transformation, CI pipeline automation, and identity access management. Brad is highly skilled in Analytics, Incident Management, Vulnerability Management, ISO 27001:2013, and Enterprise Architecture. He has an extremely knowledgeable computer science background and holds a CISSP certification.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805123019 , 1805123017
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.276
    Keywords: Active server pages ; Microsoft .NET Framework ; Internet programming ; Web site development ; Programmation Internet ; Sites Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with an introduction, setting you up with essential tools and a clear roadmap for your learning journey. Delve into the fundamentals of .NET Core, understanding the MVC architecture, routing intricacies, and dependency injection. As the course progresses, you'll dive into Category and Product CRUD operations, gaining hands-on experience with database connectivity, Entity Framework Core, and dynamic UI development. We will learn the nuances of Razor Projects and the significance of N-Tier Architecture, enhancing your understanding of scalable and maintainable code structures. The Repository Pattern module deepens your grasp of efficient data handling, leading to seamless database transitions. We will also cover shopping cart implementation, order processing, and user management. You'll tackle advanced features like product image handling, social logins, and interactive UI elements, ensuring your e-commerce platform stands out. As you approach the course's climax, the focus shifts to crucial aspects of user authentication, role management, and secure user experiences with .NET Core Identity. The final modules guide you through deploying your application, integrating email services with SendGrid, and refining your project for real-world use. What you will learn Implement CRUD operations for products and categories Develop and manage Razor Projects with advanced features Apply N-Tier Architecture and Repository Patterns for scalable applications Build and manage shopping carts and order processes Integrate user authentication and manage roles using .NET Core Identity Employ deployment techniques and email integrations Handle multiple product images and social logins effectively Audience This course is designed for learners at all levels interested in mastering ASP.NET MVC Core (.NET 8), from the basics to advanced concepts. Ideal for anyone from web development beginners to seasoned professionals, this is a comprehensive guide for those looking to master Microsoft's latest framework and design large-scale projects using cutting-edge technologies. The ideal participants should have 3-6 months of experience in C# programming, and familiarity with tools like Visual Studio 2022, SQL Server Management Studio, and .NET 6 is recommended to fully benefit from the course content. About the Author Bhrugen Patel: Bhrugen Patel is a Microsoft MVP and a passionate Software Architect, known for his dedication to simplicity and attention to detail. With a background in programming that dates back to high school, Bhrugen has developed a range of web and desktop applications using .NET. He holds a Master's of Science in Computer Science and a Bachelor's in Computer Engineering, complementing his practical expertise. Alongside his full-time role, Bhrugen is devoted to teaching, driven by a mission to simplify coding and make it accessible. His goal is to alleviate the struggles of students seeking understandable resources. For Bhrugen, coding is not just a profession; it's a means to be creative and enjoy the journey of technological innovation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888148 , 1835888143
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Service-oriented architecture (Computer science) ; Architecture logicielle ; Architecture orientée service (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Docker, the pivotal tool in container technology, with our Docker Mastery course. Designed for beginners, this course guides you through the essentials of Docker, explaining its importance and how it revolutionizes deployment processes. Starting with an introduction to Docker and its ecosystem, you'll understand why Docker is a game-changer in software development and deployment. You'll set up your development environment, master Docker fundamentals through hands-on exercises, and learn to manage containers efficiently. The course progresses to more complex topics like Dockerfile, image publishing, Docker layers, caching, and Docker Compose for multi-tier applications. With a special focus on CI/CD using Docker, GitHub Actions, and AWS Elastic Beanstalk, you'll gain the skills to automate your deployment workflows, ensuring faster and more reliable releases. By the end, you'll have a solid foundation in Docker, ready to tackle real-world challenges and streamline your development pipeline. What you will learn Setup and manage your Docker development environment Run, stop, and manage containers and images efficiently Optimize Dockerfile for effective image creation and management Publish Docker images and explore Docker layers and caching Develop CI/CD pipelines with Docker, GitHub Actions, and AWS Deploy complex web applications using Docker Compose Audience This course targets aspiring DevOps professionals, software developers, system administrators, IT managers, QA engineers, and technology enthusiasts. Ideal for those aiming to refine development workflows, enhance application portability, and ensure project consistency using Docker. It's perfect for individuals responsible for efficient app deployment, scaling, and management, as well as QA professionals looking to improve testing accuracy. No Docker experience required; some programming knowledge preferred but not essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884461 , 1835884466
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; COBIT (Information technology management standard) ; Technologie de l'information ; Gestion ; COBIT (Norme) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to COBIT 19, setting the stage for a comprehensive exploration of enterprise governance of information and technology. It delves into the significant benefits I&T governance brings to the table, emphasizing the importance of aligning IT processes with business goals. The course focuses on detailing what COBIT is and importantly, what it is not, establishing a clear understanding of its scope and application. Through an examination of COBIT's six principles for a governance system and its three framework principles, learners gain insights into the enhancements introduced in COBIT 2019. The course wraps up by guiding learners through the governance and management objectives, the components of the governance system, and the impactful design factors, alongside providing practical insights into the COBIT implementation guide approach. Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. What you will learn Understand enterprise governance of IT Navigate COBIT 2019 enhancements Identify governance and management objectives Apply COBIT in various IT scenarios Achieve COBIT certification readiness Plan for continual IT governance improvement Audience This course is ideal for IT professionals, auditors, and managers aiming to bolster their organization's IT governance. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886267 , 1835886264
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. From the outset, learners are immersed in the Blender Basics Overview, accompanied by a rich Resource Pack, to swiftly get up to speed with the software's capabilities. Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. The course continues through the nuances of creating detailed 3D environments, leveraging greyboxing techniques, and applying lifelike textures and materials to bring scenes to life. Special emphasis is placed on generating creative references using AI, crafting natural elements with geometry nodes, and designing intricate architectural features that stand out in any portfolio. As the course progresses, learners delve into advanced modeling, lighting, and the art of texture application, culminating in a segment dedicated to rendering techniques that showcase their projects in the best light. By the end, participants are not just proficient in Blender; they are equipped with a holistic view of 3D design, enabling them to bring their creative visions to fruition. What you will learn Navigate Blender's interface and tools Create efficient asset management workflows Design 3D environments with advanced greyboxing Apply textures and materials for realism Construct architectural elements in Blender Model and texture dynamic 3D foliage Audience This course is ideal for 3D artists, designers, and enthusiasts looking to enhance their Blender skills. Prior basic knowledge of 3D concepts is helpful but not required. This course is perfect for those seeking to create professional 3D models and environments. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835460429 , 1835460429
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your 3D modeling journey with Blender, starting from the basics of setting up projects and creating grey boxes to organizing work with collections. Learn the intricacies of seams, sharps, and UV mapping, essential for effective texturing. The course progresses to scene optimization and asset management, followed by an exploration of materials, shaders, and advanced mesh editing techniques, including proportional editing and the use of Booleans. Dive deeper into refining skills with texturing, structural elements, and the art of adding Viking details. Transition your creations to Unreal Engine 5, where you'll set up scenes, integrate assets, and apply advanced materials for realistic environments. This course, designed for beginners ready to advance their skills, combines detailed instruction with project-based learning, preparing you for a career in 3D modeling and game development. From Blender's fundamentals to UE5's dynamic environment, unlock your creative potential and bring your digital worlds to life. What you will learn Utilize UV mapping for texture perfection Optimize 3D scenes for efficiency Craft materials and unique shaders Employ advanced mesh editing techniques Transition assets from Blender to UE5 Finalize scenes with professional lighting Audience This course is ideal for aspiring 3D artists and game developers with a keen interest in environment design. No prior experience is needed, making it perfect for beginners ready to dive into the world of 3D modeling and scene creation. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835466124 , 1835466125
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking ; Tests d'intrusion ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. It covers techniques such as Web App Enumeration, HTTPS analysis with Wireshark and Burp Suite, and POP3 Enumeration, setting the stage for deeper exploration into cybersecurity defenses. The course focuses on practical application, moving from theoretical concepts to real-world hacking techniques. Learners will navigate through gaining access, exploiting systems, and executing privilege escalations both horizontally and vertically. Scenarios involving systems like GoldenEye, Bob, and Straylight offer hands-on experience, emphasizing the attacker's perspective to fortify defense mechanisms. The course wraps up with advanced topics in exploit development and real-world applications, challenging learners to apply their knowledge in complex environments. From scanning and enumeration to gaining access and privilege escalation, learners will develop a solid foundation in hacking techniques and cybersecurity defense. This course not only equips technical professionals with essential skills but also empowers them to think like a hacker, a vital perspective in today's digital world. What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885925 , 1835885926
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Artificial intelligence ; Computer programming ; Chatbots ; Application program interfaces (Computer software) ; Python (Computer program language) ; Intelligence artificielle ; Programmation (Informatique) ; Interfaces de programmation d'applications ; Python (Langage de programmation) ; artificial intelligence ; computer programming ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive masterclass takes you on a transformative journey into the realm of LangChain and Large Language Models, equipping you with the skills to build autonomous AI tools. Starting with the basics, you'll set up your development environment, including OpenAI API and Python, and progress to advanced topics like LangChain's architecture, prompt templates, and parsers. The course meticulously guides you through creating complex chains, memory models, and agents, culminating in the development of practical applications such as PDF extractors, newsletter generators, and multi-document chatbots. With hands-on tutorials, you'll learn to leverage LangChain for tasks ranging from document loading and splitting to embedding vector stores for semantic similarity searches. By the end, you'll have the knowledge to implement AI in creative and impactful ways, from image-to-text conversion to building interactive chatbots and more, all while navigating the ethical considerations of AI deployment. What you will learn Configure OpenAI API and Python for AI development Create and manipulate LangChain prompt templates and parsers Implement LangChain memory models and chains for complex AI applications Develop real-world applications, including newsletter generators and chatbots Work with LangChain embeddings and vector stores for semantic searches Navigate the ethical and copyright implications of AI-generated content Audience This course is designed for a broad audience interested in artificial intelligence, from data scientists enhancing projects with AI and LangChain, to product managers boosting user experience with AI features. AI enthusiasts, tech innovators, and programmers will deepen their understanding of LangChain, unlocking new opportunities in AI-driven development and pioneering next-gen solutions. While specific knowledge of Python is not necessary, familiarity with programming concepts is essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837632039 , 1837632030
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 025.04
    Keywords: Recommender systems (Information filtering) ; Artificial intelligence ; Artificial intelligence ; Recommender systems (Information filtering)
    Abstract: Recommender systems are algorithms that suggest relevant items to users (movies, books, products, or a service). Recommender systems are critical in specific industries to generate massive incomes efficiently or stand out significantly from competitors. The course begins with basic recommender system concepts. You will learn important recommender system taxonomies and recommender system mechanism development using machine and deep learning with Python. Python as a programming language will be taught in this course to implement machine and deep learning concepts efficiently. You will model a k-nearest neighbor-based recommender engine for various applications and know the pros and cons of deep learning-based mechanisms. You will build a recommender system for apps such as Spotify and explore neural collaborative filtering and variational auto-encoders for collaborative filtering. You will explore various matrices (item context, user rating, and error). You will understand recommender system quality, online/offline evaluation techniques, dataset partitioning, and overfitting. Upon completing the course, you will understand the roles and impacts of recommender systems in real-world applications with a unique hands-on experience in developing complete recommender system engines for customized datasets in various projects. What You Will Learn Explore recommender systems with integrated artificial intelligence Build item-based recommender systems with machine learning/Python Understand the pros and cons of deep learning in recommender systems Learn the basic neural network models for recommendations Understand the mechanism of generic deep learning-based approaches Implement two-tower models for developing a recommender system Audience This course is designed for individuals wanting to advance their applied machine/deep learning and master data analysis; individuals wishing to build customized recommender systems for their apps and implement machine/deep learning algorithms; individuals passionate about content and collaborative filtering-based and two tower-based recommender systems. Machine and deep learning practitioners, research scholars, and data scientists would also benefit from this course. As prerequisites, no prior recommender systems, ML, data analysis knowledge is needed. Basic Python knowledge is required. About The Author AI Sciences: AI Sciences is a group of experts, PhDs, and practitioners of AI, ML, computer science, and statistics. Some of the experts work in big companies such as Amazon, Google, Facebook, Microsoft, KPMG, BCG, and IBM. They have produced a series of courses mainly dedicated to beginners and newcomers on the techniques and methods of machine learning, statistics, artificial intelligence, and data science. Initially, their objective was to help only those who wish to understand these techniques more easily and to be able to start without too much theory. Today, they also publish more complete courses for a wider audience. Their courses have had phenomenal success and have helped more than 100,000 students master AI and data science.
    Note: "Published in February 2023."
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837635092 , 1837635099
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.33
    Keywords: Human-computer interaction ; Machine learning ; Python (Computer program language) ; Artificial intelligence ; Artificial intelligence ; Human-computer interaction ; Machine learning ; Python (Computer program language) ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Chatbots are software applications used for online chat conversations through text or text-to-speech instead of providing direct contact with a live human agent. Chatbots are used in dialog systems for various purposes, including customer service, request routing, or information gathering. This course begins with a brief overview of chatbots, their need, and the types of chatbots. We will explore rule-based versus self-learning chatbots. We will understand the working mechanism of chatbots. We will explore machine learning-based chatbots and understand the ML-based architecture of chatbots. You will learn about the purpose of ML-based chatbots and their impact. We will get an overview of the Natural Language Toolkit (NLTK). You will learn to install packages and create a corpus with Python. We will delve into text preprocessing and helper function deployment, generate responses, and implement term-frequency times inverse document-frequency. We will train and test rule-based chatbots and finally work on a project developing an artificial intelligence question-answer chatbot using NLTK. Upon course completion, you will be able to relate the concepts and theories for chatbots in various domains, understand and implement machine learning models for building real-time chatbots, and evaluate machine learning models in chatbots. What You Will Learn Learn about chatbot types, rule-based and self-learning chatbots Learn text preprocessing and develop helper functions with Python Explore the impact and overview of the Natural Language Toolkit Gain hands-on practice, generate text in Python to develop chatbots Explore testing and training of chatbot with machine learning Implement term-frequency times inverse document-frequency hands-on Audience This course delivers content to people wishing to advance their skills in applied machine learning, master data analysis with machine learning, build customized chatbots for their applications, and implement machine learning algorithms for chatbots. This course is for you if you are passionate about rule-based and conversational chatbots. Machine learning practitioners, research scholars, and data scientists can benefit from the course. No prior knowledge of chatbots, or machine learning, is needed. You will need to know basic to intermediate Python coding, which is not taught separately in the course. About The Author AI Sciences: AI Sciences is a group of experts, PhDs, and practitioners of AI, ML, computer science, and statistics. Some of the experts work in big companies such as Amazon, Google, Facebook, Microsoft, KPMG, BCG, and IBM. They have produced a series of courses mainly dedicated to beginners and newcomers on the techniques and methods of machine learning, statistics, artificial intelligence, and data science. Initially, their objective was to help only those who wish to understand these techniques more easily and to be able to start without too much theory. Today, they also publish more complete courses for a wider audience. Their courses have had phenomenal success and have helped more than 100,000 students master AI and data science.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 21, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781837632244 , 1837632243
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This refresher course covers all the eight domains of the CISSP certification exam. You will cover topics ranging from security and risk management in an organization. How organizations use asset management to discover what data and systems exist in their organization in order to provide proper protection. You will learn security in architecture, networking, and physical locations. Lastly, you will see how security fits in the software development lifecycle and how organizations test and monitor for security in their organization. Further, you will learn about the importance of security concepts such as confidentiality, integrity, and availability. How authentication and authorization are used to manage user and system access. How organizations prepare for disasters and ready themselves to resume operations. How risk management is used to define the organization's approach to security. By the end of this course, you will have a much better understanding of how security fits in an organization and will be prepared to take this examination. What You Will Learn Understand risk, threat, and vulnerability management Understand the importance of security training Learn asset management, retention, and lifecycle Learn cryptography principles and their application in a system Understand facility design and protection against threats Understand security in the software development lifecycle Audience This course is for cyber security professionals looking to expand their knowledge and take the CISSP exam and for technology practitioners who want to understand cyber security and leaders who want to understand cyber security. About The Author Derek Fisher: Derek Fisher is a leader, speaker, author, and instructor in cyber security. He has several decades of experience in designing systems in both hardware and software and holds a graduate degree in cyber security from Boston University. He continues to work professionally as a leader, university instructor, and conference speaker in the security space, where he provides his insight into multiple fields and disciplines.
    Note: Online resource; title from title details screen (O’Reilly, viewed February 7, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805120438 , 1805120433
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Cloud computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Google Cloud platform is one of the most rapidly growing cloud providers in the market today, making it an essential skill for aspiring cloud engineers and data scientists. This comprehensive course covers all major serverless components on GCP, providing in-depth implementation of machine learning pipelines using Vertex AI with Kubeflow, and Serverless PySpark using Dataproc, App Engine, and Cloud Run. The course offers hands-on experience using GCP services such as Cloud Functions, Cloud Run, Google App Engine, and Vertex AI for custom model training and development, Kubeflow for workflow orchestration, and Dataproc Serverless for PySpark batch jobs. The course starts with modern-day cloud concepts, followed by GCP trial account setup and Google Cloud CLI setup. You will then look at Cloud Run for serverless and containerized applications, and Google App Engine for serverless applications. Next, you will study cloud functions for serverless and event-driven applications. After that, you will look at data science models with Google App Engine and Dataproc Serverless PySpark. Finally, you will explore Vertex AI for the machine learning framework, and cloud scheduler and application monitoring. By the end of the course, you will be confident in deploying and implementing applications at scale using Kubeflow, Spark, and serverless components on Google Cloud. What You Will Learn Deploy serverless applications using Google App Engine, Cloud Functions, and Cloud Run Learn how to use datastore (NoSQL database) in realistic use cases Understand microservice and event-driven architecture with practical examples Deploying production-level machine learning workflows on cloud Use Kubeflow for machine learning orchestration using Python Deploy Serverless PySpark Jobs to Dataproc Serverless and schedule them using Airflow/Composer Audience This intermediate course is designed for those who aspire to become data scientists and machine learning engineers, data engineers, architects, and anyone with a decent exposure in IT looking to start their cloud journey. The course is ideally suited for individuals who possess a fair idea of how the cloud works and have prior experience in basic programming using Python and SQL. A tech background with basic fundamentals and basic exposure to programming languages such as Python and SQL along with the Bash command line will further help individuals fast-track their learning. About The Author Siddharth Raghunath: Siddharth Raghunath is a business-oriented engineering manager with a vast experience in the field of software development, distributed processing, and cloud data engineering. He has worked on different cloud platforms such as AWS and GCP as well as on-premise Hadoop clusters. He conducts seminars on distributed processing using Spark, real-time streaming and analytics, and best practices for ETL and data governance. He is passionate about coding and building optimal data pipelines for robust data processing and streaming solutions.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805124597 , 1805124595
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) ; Neural networks (Computer science) ; Artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: ChatGPT is a language generation model developed by OpenAI. Its newest form, Davinci, is behind the ChatGPT program we all know. It grew popular in December 2022 after people started using it and seeing how amazingly it deals with prompt-response completion questions. This course's objective is to build applications and solutions with ChatGPT. You will do that by learning more about OpenAI and ChatGPT and how to use their APIs in your platforms. You will create a serverless function that can take ChatGPT prompts and return responses--the first step to integrate your ChatGPT into your app. You will learn to incorporate the ChatGPT API into many platforms. Connect to OpenAI API and create Azure functions that leverage ChatGPT. Finally, you will develop complete applications and solution examples, including CoverLetterCreator, StockPhotoPPT, PolitelySayNo, and TravelPlan. Upon completion, you will use ChatGPT to increase your productivity and build real-life solutions and applications from scratch using ChatGPT. You will leverage this unique AI model with other OpenAI models such as DALL-E to create business software independently. You will integrate the API into different platforms, including Outlook, Power Apps, Power Automate, Airtable, and Bubble, and build real-life applications and solutions from scratch. What You Will Learn Integrate ChatGPT into business, Outlook, Teams, Excel, and Bubble Build no-code apps, Power Apps, Airtable, TravelPlan, and Tchat Create an app to plan itineraries based on location and trip length Integrate ChatGPT API into Azure Functions to incorporate it anywhere Build a ChatGPT app to create cover letters based on jobs and resumes Make an app to generate stock photos for pitch presentations, slide decks Audience This course is designed for managers and employees who want to integrate ChatGPT into their daily workflows, to improve the efficiencies of their teams by integrating ChatGPT into their tools. Individuals wishing to build and monetize full applications and solutions using ChatGPT or students who want to learn to link ChatGPT into other application/solution-building software such as Bubble, Airtable, Power Apps, and more benefit from this course. About The Author HHN Automate Book Inc.: Henry Habib is a seasoned manager at a leading management consulting firm. He leverages his expertise to provide counsel on growth strategy, operation, and analytics to Fortune 500 companies. With a strong background in implementing data-driven solutions, Henry has a proven track record of making an impact in organizations of all sizes. He strongly advocates for no-code application development in business and deploys such solutions for his clients. These solutions are not only easier to understand but also quicker to implement. In addition to his consulting work, Henry is a dedicated professor who takes pleasure in guiding students toward success in various fields, ranging from case interviews to no-code application development and automation. His courses are designed to be engaging and informative, and he is always available to assist students in mastering challenging concepts.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 24, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805124436 , 1805124439
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Node.js ; Web applications ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This comprehensive course is designed to take you from the very basics of setting up a web server to creating server-based and serverless applications using the Express framework and Node.js. This course starts with an introduction to Node.js, then you will explore more about the Node.js filesystem. Following that, you will be learning about Express.js and its use cases. After that, you will work on a small project using Express.js and use various CRUD operations while working on the project. Next, you will build a serverless app with API requests. Throughout the course, you will learn how to set up routes, handle post requests, use middleware, authenticate usernames and passwords with Express and Passport, and use Handlebars for templating. Additionally, you will gain hands-on experience in working with databases, hashing and salting, and setting up sign-up forms and log-out functionality. By the end of this course, you will have the confidence and skills to build your own web applications with the Express framework and Node.js. With code-along sessions, quizzes, and solution files available every step of the way, you will be able to reinforce your knowledge and practice until you feel confident in your ability to develop professional-quality applications. What You Will Learn Use optimize and refactor techniques to write efficient and effective code Learn how to set up a web server from scratch with Express and Node Understand the fundamentals of Express.js (CRUD operations) Look at templating engines with Handlebars from scratch Build a serverless app with API requests Learn to solve problems and dig through documentations like a developer Audience If you are looking to improve your coding skills and gain a deeper understanding of the Express framework, then this course is perfect for you. Whether you are an aspiring programmer, web developer, student, or experienced professional, this course is designed to provide you with the knowledge and skills necessary to develop advanced web applications using Express framework and Node.js. No prior programming experience is required, but some familiarity with JavaScript and web development is recommended. About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and has been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835084625 , 1835084621
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) Computer programs ; Neural networks (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course is designed to help you harness the power of ChatGPT and create a lifelike voice assistant or sales chatbot that is fluent in any language. You will learn how to build a web application that showcases the power of Eleven Labs and ChatGPT AI technology. In the first section, you will set up your environment for front-end and back-end development, including installing the necessary packages and tools. The second section covers the basics of web development and creating a simple UI for your application. The third section dives deeper into the backend, working with AI and building the core functionality of your chatbot. In the fourth section, you will learn how to integrate ChatGPT into your application and create a smooth conversational flow. The fifth section covers building the frontend of your application and adding audio recording and playback functionality. Finally, in the sixth section, you will learn about further prompt engineering and use cases for your chatbot. By the end of this course, you will be able to build a fully functional voice assistant or sales chatbot using the power of Eleven Labs and ChatGPT AI technology. You will have gained valuable experience in web development, working with AI, and integrating different technologies to build a complex application. What You Will Learn Build a realistic, lifelike chatbot for any purpose Create chatbots with different personalities, including voice and sales personas Implement ChatGPT and Eleven Labs AI into your applications Learn about full-stack development using React and FastAPI Understand prompt engineering for chatbot development Explore real-time AI interaction in a fun and engaging way Audience This course is ideal for developers, programmers, or anyone with an interest in artificial intelligence and building lifelike voice assistants or chatbots. Prior knowledge of programming and familiarity with JavaScript and React is necessary. The course assumes that you have a basic understanding of front-end and back-end development and of REST APIs and HTTP requests. If you have an interest in creating innovative voice assistants and chatbots using cutting-edge technology, this course is for you. About The Author XCHAIN ANALYTICS LTD: XCHAIN ANALYTICS LTD is a lead analyst and full stack developer with expertise in Python and React. His passion lies in discovering and promoting innovative ideas that are often overlooked in the hype-driven tech industry. With a focus on authenticity and practicality, Shaun strives to share his knowledge and empower others through teaching. He believes in the power of continuous learning and experimentation, and often finds himself exploring new ventures. However, he always returns to teaching as his true calling, where he can put his ideas into action and help others effectively.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805122029 , 1805122029
    Language: English
    Pages: 1 online resource (1 video file (29 hr., 55 min.)) , sound, color.
    Edition: Second edition.
    DDC: 005.3
    Keywords: Application software Development ; Flutter (Computer program language) ; Dart (Computer program language)
    Abstract: This Flutter course is an excellent opportunity to discover the power of Flutter and Dart for creating stunning, high-performance mobile apps on both iOS and Android platforms. The course will provide you with detailed setup instructions for both macOS and Windows; a thorough introduction to Flutter, Dart, and the concept behind widgets; and an overview of the built-in widgets along with instructions on how to add your own. It will provide you with a strong understanding of the basics of Flutter and Dart, including how to analyze a new Flutter project, import features from packages, use a first widget, and pass values to functions. Additionally, you will learn how to work with constructor functions. You will also learn debugging tips and tricks, page navigation with tabs, side drawers, and stack-based navigation, state management solutions, handling and validating user input, connecting your Flutter app to backend servers by sending HTTP requests, user authentication, adding Google Maps, using native device features such as the camera, adding beautiful animations and page transitions, image upload, and push notifications. Throughout the course, you will build multiple demo apps that range from simple to more complex. By the end of the course, you will have the skills necessary to build your own iOS and Android apps using Flutter. What You Will Learn Understand Flutter, Dart, and the concept behind widgets Connect your Flutter app to backend servers by sending HTTP requests Learn to use native device features like the camera Learn to add beautiful animations and page transitions Learn to upload images and send manual/automated push notifications Learn how to add Google Maps to the app Audience This course is suitable for both beginner and experienced developers who want to learn mobile app development using a single language for both iOS and Android platforms. It is also ideal for experienced iOS or Android developers looking to build cross-platform apps using a single programming language. Although basic programming knowledge is beneficial, it is not mandatory, and no prior experience in Flutter or Dart is needed. Additionally, no previous experience in iOS (Swift/ObjectiveC) or Android (Java/Kotlin) development is necessary. About The Author Academind by Maximilian Schwarzm©ơller: Academind GmbH Bundling the courses and the knowledge of successful instructors, Academind strives to deliver high-quality online education. The platform covers topics such as web development, data analysis, and more in a fun and engaging way. Maximilian Schwarzm©ơller Since the age of 13, he has never stopped learning new programming skills and languages. In his early days, he started creating websites simply for fun. This passion has remained and shaped his decision to work as a freelance web developer and consultant. Although he started web development on the backend (PHP with Laravel and NodeJS), he has progressed to becoming a front-end developer using modern frameworks such as React, Angular, and VueJS 2 in many projects. The most rewarding experience for him is to see how people find new and better jobs, build exciting web applications, acquire amazing projects, or simply enjoy their hobby with the help of his content.
    Note: "Academind.". - "Updated May 2023."
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835089934 , 1835089933
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 776
    Keywords: Computer graphics Programming ; Computer art ; Artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Midjourney is a user-friendly platform that revolutionizes the design process. It empowers designers of all levels to create stunning visuals effortlessly. With its versatile tools and intuitive interface, Midjourney opens a world of endless creativity. Whether you are an aspiring designer or a seasoned professional, this platform provides the tools and resources to propel your design career forward. The course begins with an introduction to Midjourney, guiding us through the initial setup and familiarizing us with the platform's features. We will explore different techniques to capture and express creative vision, generate captivating images and patterns, optimize designs by adjusting aspect ratios, and utilize stylization commands. The course delves into advanced topics such as testing models, adjusting quality settings, and leveraging chaos for desired outcomes. You will learn time-saving strategies, including using presets and assigning importance to words. Ethical considerations surrounding Midjourney are addressed, as well as real-world applications for business growth. Upon completion, you will be equipped with the skills to confidently navigate Midjourney, create stunning visuals, optimize designs, and use its features for personal and professional growth, unleashing the full potential of this innovative design platform. What You Will Learn Learn to create stunning designs using Midjourney's AI capabilities Explore and master various art styles on the Midjourney platform Use essential commands in Midjourney to optimize design workflow Develop skills in crafting repeatable and versatile patterns Design engaging/expressive art content for personal/commercial use Discover strategies to turn Midjourney creations into profitable ventures Audience This course is ideal for those eager to embrace new technology, equivalent to learning to code 20 years ago. Designers seeking to stay relevant and up to date with cutting-edge technology will find tremendous value in mastering Midjourney and gain the opportunity to propel their skills and career forward in the ever-evolving world of design. The prerequisites include the Midjourney Basic Plan, which offers an affordable monthly subscription at just $10. With this plan, you gain access to a range of features and tools that will enable you to create fantastic designs. About The Author Cristian Doru Barin: Chris Barin is a seasoned web and app designer with extensive Photoshop experience. As an Adobe Certified Instructor and Photoshop Expert, he has gained the trust of over 270,000 students worldwide. Chris's courses are practical and result-driven, emphasizing efficiency. From his freelance beginnings to running a successful Android design studio, he has earned over $50k and amassed 100 million app downloads. Passionate about teaching, Chris shares his experiences vocally, offering top-rated/best-selling courses on Udemy. His responsiveness, clear explanations, and effective teaching style have a huge fan following. He loves to connect with learners to enhance their learning experience and gain valuable insights into the design industry.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805126041 , 1805126040
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/112
    Keywords: Scrum (Computer software development) ; Scrum (Computer software development) Certification ; Agile software development ; Project management ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This PSM II2 certification course will help you fully prepare for the PSM 2II Certification Exam. The course begins with a review of the foundational principles of Scrum, including Sprint Planning, the Daily Scrum, Sprint Review, Sprint Retrospective, and Scrum Artifacts. Subsequently, the course delves into the differences between traditional managers and Scrum Masters and covers the key responsibilities of a Scrum Master, as well as how to optimize product owner efficiency. In addition, you will learn valuable Scrum Master tips and tricks. This course further moves into explaining the product vision and product management backlog. It also helps you understand the product backlog grooming and estimation techniques. It will take you through the concepts of continuous delivery and integration. This course further takes you through the 21 tips to master PSM II. It will help you implement good engineering practices, how to maintain balance within the team, and how to encourage team autonomy and self-management. It will also take you through more tips such as respecting team space, noting your team's strengths and weaknesses, and how to create cordial relationships with the organization's management, to name a few. By the end of the course, you will understand how to easily manage products for your stakeholders with product backlog and user stories to gather requirements more effectively. What You Will Learn Learn the difference between a traditional project manager and a Scrum Master Learn to train and coach your product owner using Agile Scrum techniques Understand the accountabilities of a Scrum team Understand the challenges faced by a Scrum Master Learn about product backlog grooming and estimation Understand the 21 tips to become a successful Scrum Master Audience This course is intended for individuals who seek a comprehensive understanding of Scrum and want to ensure that they have accurate information. It is ideal for those preparing for a PSM II / PSM 2 / Professional Scrum Master Scrum certification, as well as those seeking clarity on frequently misunderstood points within Scrum. Additionally, this course is a useful resource for experienced professionals who desire a concise and efficient refresher in scrum PSM I / PSM 1 / Professional Scrum Master. This course is suitable for Scrum masters, product owners, team members, business stakeholders, and anyone who wants to learn how to manage complex projects using Scrum. About The Author Paul Ashun: Paul Ashun is the CEO, MD, and chief consultant at Pashun Consulting Ltd., specializing in Scrum coaching and leadership within major global organizations. They are the authors of over 10 books on Scrum such as The Power of Scrum in the Real World, Confessions of a Scrum Master as well as the upcoming Agile User Storybook. He started as a software developer and over ten years later, he became an Agile portfolio manager. He is a certified Scrum Master and a PMO manager. He has led projects for the BBC, General Electric, Oracle, BSkyB, HiT Entertainment, and Razorfish. He has been coaching product owners and business analysts in international blue-chip companies dating back to 1999, in Agile and Scrum practices such as writing user stories.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805122050 , 1805122053
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; Computer programming ; Recursion theory ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: We understand that learning programming can be overwhelming, especially when it comes to problem-solving under pressure during coding interviews. That's why we have developed an efficient model of hours upon hours of practice examples, complete with multiple solutions and a glossary of definitions. This approach allows you to move through the course at your own pace, starting with the very basics of programming in JavaScript, such as datatypes, or diving right into code examples, matrices, Fibonacci sequences, and more. The course is divided into four main sections. First, an introduction will help you set up the necessary tools and provide an overview of what you can expect to learn. From there, the course covers the introduction to programming and JavaScript basics for absolute beginners. Next, you will explore data structures, from zero to intermediate level, before moving on to the fundamentals of algorithms. Finally, you will learn about advanced algorithms and data structures, giving you a complete picture of this essential skill set. You will gain the experience and focused practice needed to overcome any challenge in JavaScript and programming data structures and algorithms. By the end of the course, you will be confident in your knowledge and prepared to tackle coding interviews, impressing your future interviewer and colleagues alike. What You Will Learn Sign in to the CodeSandbox IDE and create a new Vanilla.js template on it Look at the comments, datatypes, variables, functions, and operators in JavaScript Use the splice method to decode the puzzle and update new user database Build an Uber app customer JavaScript object database Automate a company's website with correct formatting in JavaScript Understand the Fibonacci series and recursion in JavaScript Audience This course is designed for individuals who want to gain a comprehensive understanding of JavaScript and tackle coding interview challenges with confidence. If you have been struggling to grasp the fundamentals of programming or feel uncertain about solving coding problems, this course is perfect for you. If you are interested in pursuing a career as a programmer or seeking to upskill in advanced topics, whether you are a beginner or have prior experience with JavaScript, this course will teach you advanced concepts in data structures and algorithms to take your skills to the next level. No programming experience is required as you will learn everything from the ground up. About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835081785 , 1835081789
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) Computer programs ; Neural networks (Computer science) ; Artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: ChatGPT is an advanced AI-based conversational agent developed by OpenAI. It is a large language model trained on massive data to understand natural language and generate human-like responses to various questions and prompts. ChatGPT is designed to engage in multiple conversational tasks, from answering general knowledge questions to providing personalized recommendations and advice. This course begins with a brief introduction to ChatGPT and LLMs and delves into tips for success and getting the most out of ChatGPT. It discusses in detail the strengths, weaknesses, restrictions, and limitations of ChatGPT. The importance of verifying information and finding relevant sources is examined. You will learn to create a Notion Swipe File to supercharge our ChatGPT use and different strategies for drafting perfect prompts. We will explore advanced prompt engineering to enhance our outputs and the art of utilizing follow-up prompts. You will learn to tailor prompt outputs to specific voice tones and use context primers to personalize your outputs further. We will explore endless lists of ideas regarding verbs, formats, expert personas, and customer archetypes. Upon completion, you will be adept at using ChatGPT for social media content creation, account growth, and post ideation, and improve efficiency in professional and personal settings. What You Will Learn Explore advanced features and capabilities of ChatGPT Understand the strengths, weaknesses, and limitations of ChatGPT Acquire problem-solving/decision-making skills with ChatGPT predictivity Develop skills to train and fine-tune ChatGPT models for specific apps Understand the ethical/potential risks of using AI in communication Learn advanced AI art and graphics generation (using ChatGPT/MidJourney) Audience This course is designed to be accessible to learners of all levels and caters to professionals and freelancers who are seeking to integrate ChatGPT into their work and personal lives; students looking to upskill and learn how to utilize ChatGPT in their schooling best; and jobseekers looking to leverage the tool to increase their chances of landing their dream career. The prerequisites for the course include a ChatGPT account and the willingness to learn. No coding or technical knowledge is required to complete the course. About The Author Sean Melis: Sean is a seasoned multimodal designer with 15 years of experience, skilled in social media marketing, web design, video production, community management, technology consulting, and conversational AI. As the founder of a successful startup, Bot Hello, he has developed chatbots for renowned brands like Maybelline New York, Lanc©þme, Anytime Fitness, and Mercedes Benz, and for Australia's largest music festivals, health-food brands, and AFL teams. Sean has worked as an AI consultant for Deloitte. Courier Mail recognized him as a B&T 30 Under 30 Entrepreneur and Top 20 Under 40 Entrepreneur. Sean enjoys helping people understand and utilize tools like ChatGPT, fulfilling their lives and focusing on activities they love.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805122470 , 1805122479
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13
    Keywords: Programming languages (Electronic computers) ; Blockchains (Databases) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Solidity is the most popular blockchain language in the world designed to build DApplications (Smart Contracts). It powers Ethereum and there is an in-demand exponential growth of high-paying jobs all over the world, which is changing the way we conduct business. The course starts with covering the Solidity fundamentals including variables, if/else, operators, Boolean logic, functions, arrays, modifiers, loops, strings, and more. You will also learn Solidity from scratch with topics such as public and private visibility, struct and Enums, special global and blockchain variables, suffixes, and addresses. You will also learn how Solidity works behind the scenes including the Ethereum Virtual Machine (EVM) and assembly, events and logging blockchain emissions, send versus transfer methods, scoping, and more. There will be a deep dive into functions such as modifier functions, cryptographic functions, fallback functions, and function overloading. Object-oriented programming will also be covered in depth along with advanced patterns. This knowledge will be applied to build an Auction DApplication as well as plug into the live main net and access the Ethereum Blockchain Data through real-world DApplications. Finally, you will learn Solidity techniques that are used by professionals in blockchain including test network deployment, IDE, debugging, and compiling. By the end of the course, you will have the knowledge and confidence that you need in order to ace your Solidity blockchain job interviews and become a professional developer for smart contracts and DApplications. What You Will Learn Build multiple complex smart contracts from scratch for your portfolio Learn Solidity from scratch and master its fundamentals Learn the different types of functions included in the blockchain functionality Deep dive into object-oriented programming and study advanced patterns Learn the Solidity techniques that are used by professionals in blockchain Work with the Ethereum network and Web3 for debugging, deployment, and compiling Audience This course is designed for individuals who want to gain a clear and advanced understanding of Solidity. Whether you are a beginner struggling to learn Solidity or an experienced programmer looking to expand your knowledge, this course is for you. If you are interested in working on a blockchain project, this course will provide you with the skills and knowledge needed to develop smart contracts on the Ethereum network. The course also caters to those who already know Solidity and are looking for a comprehensive course to cover advanced topics. No programming experience is required as you will learn everything from the ground up. About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837635788 , 1837635781
    Language: English
    Pages: 1 online resource (1 video file (27 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) Study guides ; Computer programming Study guides ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Python is a multi-paradigm programming language with object-oriented and structured programming fully supported, and many features support functional and aspect-oriented programming (metaprogramming and metaobjects). Several other paradigms are supported through extensions, including design by contract and logical programming. This course begins with a brief introduction and covers basic to advanced programming techniques in Python. The first 12 sections of the course cover Python basics. The remaining sections cover intermediate to advanced Python concepts (OOPS, classes, lists, modules, functions, JSON, and so on). Learn to use Matplotlib, NumPy, Flask, and Android APK files. Learn database handling and build geographical apps. The ten buildable apps covered in the course include a volcano web map generator, object detector app, personal website built with Python and Flask, book inventory desktop GUI app with SQL backend, data analysis/visualization dashboard, mobile app on Android and iOS devices, an app that scrapes multiple real estate webpages data, web app to collect user data and sends emails, blog and translator with Django, and web app to process Excel files and download processed files. Upon completion, you can create executable Python programs independently and master coding syntax and Python comprehensively. What You Will Learn Develop an understanding of object-oriented programming in Python Learn how to use various Python libraries and frameworks Learn to create desktop programs, web/data apps, APIs, web scrapers Learn other programming tools like SQL, HTML, deployment, and debug Explore how to use JSON, CSV, Excel, NumPy, and Android APK files Learn data analysis and visualization with Matplotlib and PostgreSQL Audience The course exclusively delivers content for people who have not programmed before and assumes you have no previous programming knowledge. You will learn every programming concept in the context of real-life programming examples by building real-world programs. If you are a budding programmer looking to acquire comprehensive programming skillsets using Python language or are looking to master Python coding, this course is for you. The prerequisites include accessing a computer (Windows, Mac, or Linux). No prior knowledge of Python or previous programming experience is needed. About The Author PythonHow: Ardit Sulce is a Python programmer, teacher, and founder of PythonHow. He graduated in 2013 with a master's degree in science (geospatial technologies) from the University of Muenster in Germany, focusing on using Python for remote sensing. Ardit has worked with companies such as the Center for Conservation Geography to map and understand Australian ecosystems, image processing with the Swiss in-Terra, and data mining to gain business insights with the Australian Rapid Intelligence.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805128816 , 1805128817
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Electronic data processing personnel Study guides Certification ; Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In this comprehensive course, you will learn how to design and implement a robust strategy for securing data and applications in Azure, Microsoft's cloud computing platform. The course begins with an in-depth exploration of threat modeling, covering the basics of threat modeling, understanding application threat modeling, and applying the STRIDE methodology to identify and mitigate threats. You will also learn best practices for shifting from a traditional waterfall development approach to a DevOps approach and understand the phases of DevOps and the importance of DevSecOps in ensuring security throughout the development process. The course then delves into strategies for mitigating threats to data, including ransomware protection, identifying and protecting sensitive data, and governing data using Microsoft Purview and Defender for cloud apps. You will learn how to implement encryption, access controls, data classification, and data retention policies to safeguard data from unauthorized access and prevent data breaches. Real-world case studies will be used to illustrate best practices and provide practical insights into securing data and applications in Azure. By the end of this course, you will be well-equipped with the knowledge and skills needed to safeguard your organization's data and applications in Azure effectively. What You Will Learn Understand the Microsoft cloud security ecosystem and its components Manage risks using Microsoft security tools and technologies Explore the relationship between processes, technologies, and business Design a comprehensive security strategy for IaaS, PaaS, and SaaS Create a robust Zero Trust strategy for enhanced security Evaluate GRC strategies for effective cybersecurity management Audience This course is designed for individuals who are preparing for the SC-100 Microsoft Cybersecurity Architect exam and seeking to expand their knowledge of building and designing cybersecurity solutions using Microsoft products. Whether you are a cybersecurity professional looking to enhance your skills, an IT practitioner interested in Microsoft products, or an aspiring cybersecurity architect, this course provides comprehensive insights and practical guidance to help you achieve your goals. About The Author Anand Rao Nednur: Anand Rao Nednur is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure, AWS, and GCP) but is also well-versed with IAM, security, and automation with PowerShell and Python. In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in lab examinations and securing certifications. Anand is also a certified seasoned professional holding several certifications and has delivered instructor-led training in several states in India as well as several countries such as the USA, Bahrain, Kenya, and UAE. He has worked as a Microsoft-certified trainer globally for major corporate clients.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805120148 , 180512014X
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/040285536
    Keywords: Microsoft Project ; Project management Computer programs ; Project management Data processing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Microsoft Project Standard is a project management solution designed to be installed on a desktop. It supports schedule development, budgeting, task management, and reporting. Microsoft Project is designed to help users set realistic goals for project teams and customers by creating schedules, distributing resources, managing budgets, helping users create projects, tracking tasks, and reporting results. In this introduction to Project 2021, we will understand core project functionality and its advantages. The course begins with an introduction to Project 2021 and explains the new features, project plans, and costs. The course advances to getting familiar with Project and Project ribbons and commands, the Quick Access toolbar, keyboard shortcuts, views, and tables. We will advance to set up a project and create, save, open, and close a project, project calendars, and define exceptions. We will create tasks, automatic and manual, milestones, subtasks, and summaries, and use Work Breakdown Structure. We will develop material resources and add to tasks. We will explore tables and project views. We will understand basic reporting, export reports to other formats, and handle project security. Upon completion, we will independently create projects, manage and secure them using Project 2021 and easily create decision-making reports. What You Will Learn Explore the differences between Project plans and Project versions Understand the Project interface and quickly find commands Understand the difference between automatic/manual scheduled tasks Manage task and project progress, create and format basic reports Assign lag or lead time, task deadlines, constraints, task resources Create a work breakdown structure, link tasks, and add dependencies Audience If you are an individual, project manager, or a PMO looking to take your project management skills to the next level, or if you are an individual using Project 2019 or older but want to upgrade to the latest version from Microsoft to upgrade your skills in project management, then this course is for you. There are no prerequisites; however, having a project management background or some experience using older versions of Project will be an advantage. About The Author Simon Sez IT: Simon Sez IT has offered technical courses for individuals, small businesses, and Fortune 500 companies since 2008, with thousands of employees who can benefit from the easy-to-learn and hands-on software training. It offers over 8,000 video tutorials on a range of software programs. Simon Sez IT ensures stress-free eLearning and enhanced employee productivity--whether you implement new software or a technological upgrade in your work environment. With over 600,000 students from 180 countries, Simon Sez IT is the preferred online learning choice for individuals and businesses worldwide.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805120261 , 1805120263
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 620/.00420285
    Keywords: AutoCAD ; Computer-aided design ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Welcome to this course on architectural drawing with AutoCAD! AutoCAD is a computer-aided design software used for creating 2D and 3D designs and drafting. It allows designers to create and edit designs quickly, making it an essential tool for any design professional.Throughout the course, you will learn how to create, modify, and publish your own AutoCAD drawings, layouts, and plans. You will also learn how to draw section views from scratch, draft your thoughts on paper, and imagine and sketch your dream house. The course will cover basic selection, creation, and modification skills, and gradually progress to more advanced topics in a stepwise manner. The course includes practical video tutorials that demonstrate the application of tools and commands, working with PDF files, importing, and editing designs from others, and creating multiple drawings from the same model using the viewport method. You will also learn how to use advanced AutoCAD tools such as polylines and arcs, and fully dimension your drawings following drawing standards. By the end of this course, you will be able to use AutoCAD thoroughly like a pro and you will have the skills and knowledge to pursue a professional career in AutoCAD, setting you apart from your competitors. The course will guide you in building layouts from given dimensions and provide you with the necessary support to hone your skills. What You Will Learn Learn how to create 3D models and render realistic visuals Understand advanced AutoCAD commands for complex geometries and editing Build proficiency in creating custom linetypes, hatch patterns, and blocks Implement annotation tools for precise dimensions, leaders, and text Learn techniques for efficient file management and collaboration in AutoCAD Understand how to create custom templates and plot styles for printing Audience This course is designed for beginners, amateurs, engineers, architects, woodworkers, interior designers, and creatives who want to learn and improve their skills in designing and drawing using AutoCAD. It is also suitable for individuals who wish to pursue a career in AutoCAD and aim to enhance their skills for better job opportunities and higher pay. Additionally, this course is beneficial for those who may have prior experience with AutoCAD and want to revisit the basics to reinforce their knowledge. To get the most out of this course, participants should have access to AutoCAD or AutoCAD LT software on a Windows operating system, and basic familiarity with computer operations is required. About The Author Meta Brains: Meta Brains is a professional training brand developed by a team of software developers and finance professionals who have a passion for finance, coding, and Excel. They bring together both professional and educational experiences to create world-class training programs accessible to everyone. Currently, they are focused on the next great revolution in computing: the Metaverse. Their ultimate objective is to train the next generation of talent so that we can code and build the metaverse together!.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 23, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805129738 , 1805129732
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: Electronic data processing personnel Certification ; User interfaces (Computer systems) Study guides Examinations ; Cloud computing Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The primary objective of the course is to help you pass the HashiCorp Certified: Vault Operations Professional certification. It also prepares you to answer MCQs and perform hands-on tasks on a Vault node/cluster. This course teaches you how to create a working Vault server configuration for various scenarios. You will learn how to monitor a Vault environment to ensure its smooth functioning. It also covers how to employ the Vault security model to safeguard your system. You will then learn how to build fault-tolerant Vault environments that can withstand failures and disruptions. Following that, you will understand the integration of the Hardware Security Module (HSM) in Vault to increase security. You will see how to scale Vault for performance and handle a larger workload and how to configure access control to ensure that users have the right permissions to access data. After that, you will see how to configure the Vault agent for the automation of Vault operations. Finally, you will get an insight into the exam experience and expectations to prepare yourself better for the Vault Operations Pro certification exam. By the end of this course, you will be fully equipped with the skills and knowledge needed to pass the Vault Operations Professional exam and gain a solid foundation in Vault and be able to confidently use it in your organization. What You Will Learn Create a working Vault server configuration given a scenario Monitor a Vault environment and employ the Vault security model Build fault-tolerant Vault environments Understand the Hardware Security Module (HSM) integration Scale Vault for performance Configure access control and Vault Agent Audience This course is designed for DevOps engineers, cloud architects, security engineers, IT professionals, system administrators, network engineers, and infrastructure engineers. Advanced Vault operators who are looking to increase their knowledge and engineers will gain a lot from this course. To get the most out of this course, one should have earned their Vault Associate certification and have a solid understanding of Vault concepts, components, and deployment. The course assumes prior knowledge of Vault components such as storage backends, auth methods, secret engines, and Vault devices. Note that this is not an introductory-level course and will not cover Vault basics. About The Author Bryan Krausen: Bryan Krausen is an IT consultant with over 20 years of experience in enterprise IT. He specializes in Amazon Web Services and HashiCorp tools. Bryan focuses on cloud design and facilitates customer workshops that define business and technical requirements to allow businesses to deliver applications on the AWS cloud platform. He was the first individual to earn the HashiCorp Vault Expert partner certification. Bryan has deployed and assisted with adopting the HashiCorp Vault into many Fortune 1000 companies. He delivers lectures at community events, such as HashiConf (2019 to 2022), HashiTalks (2019 to 2020), and many HashiCorp user groups across the mid-west and eastern US.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805127826 , 1805127829
    Language: English
    Pages: 1 online resource (1 video file (37 hr., 1 min.)) , sound, color.
    Edition: Second edition.
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course is a comprehensive introduction to JavaScript, covering everything from the basics of variables, data types, and methods, to more advanced topics such as asynchronous programming, object-oriented programming, and unit testing. Starting with the fundamentals of the language, the course progresses through a series of carefully structured sections that build on each other to give you a solid understanding of JavaScript's capabilities and how to use them effectively. You will learn how to work with arrays and objects, write functions, and use logic and control flow to create more complex programs. From there, the course dives into more advanced topics such as DOM manipulation, event handling, and asynchronous programming, teaching you how to use these techniques to create responsive and interactive web applications. You will also learn about object-oriented programming in JavaScript, including constructors, prototypes, and classes, and build several projects along the way to put your new skills into practice. The course also covers more advanced topics such as modules, iterators, and generators, as well as unit testing and data structures. Additionally, you will get hands-on experience with tools like Webpack and Node.js, giving you a well-rounded understanding of modern JavaScript development. By the end of the course, you will have a solid foundation in JavaScript and be able to build dynamic, interactive web applications using the language. Whether you are just starting out with programming or are looking to expand your skillset, this course is the perfect way to learn JavaScript from the ground up. What You Will Learn Create and manipulate variables, data types, methods, and objects Understand control flow, loops, and iteration in JavaScript Build web applications using DOM manipulation and event handling Use asynchronous JavaScript to make web applications more efficient Implement object-oriented programming principles in JavaScript Build real-world projects such as a shopping list app and movie app Audience This course is designed for beginners who are new to programming and have little to no experience with JavaScript. It is also suitable for anyone who wants to refresh their knowledge of JavaScript and its fundamentals. This course is ideal for web developers who want to enhance their skills and build dynamic and interactive web applications. Additionally, anyone interested in pursuing a career in front-end development or web design would find this course helpful. Finally, those who want to gain experience with modern JavaScript tools and frameworks, such as Node.js and React, would benefit from this course as it provides a strong foundation in JavaScript programming. About The Author Brad Traversy: Brad Traversy has been programming for around 12 years and teaching for almost 5 years. He is the owner of Traversy Media, which is a successful web development YouTube channel and specializes in everything from HTML5 to front-end frameworks such as Angular as well as server-side technologies such as Node.js, PHP, and Python. Brad has mastered explaining overly complex topics in a simple manner that is understandable. Invest in your knowledge by watching Brad's courses.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11th, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805127321 , 1805127322
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Nessus is a vulnerability scanner that helps security professionals identify and remediate potential vulnerabilities in their network, applications, and infrastructure with a wide range of features, including vulnerability scanning, compliance management, and reporting, to help organizations assess their security and mitigate risks. This course provides the knowledge and skills needed to use Nessus effectively. We will start with the basics, such as installing and setting up Nessus, and then move on to more advanced topics such as customizing scans and automating security testing. We will differentiate Nessus Essentials versus Nessus Professional and understand automated vulnerability scanning. You will learn to write custom professional reports and learn tips and tricks to handle Nessus well. We will explore the concept of second opinion scanning and differentiate unauthenticated and authenticated scans. We will explore network and web application scans and import results of Nmap in Nessus; we will create a VA Project Worksheet and explore vulnerability scanning with Metasploit. You will learn to manually analyze and rank vulnerabilities. By the end of this course, you will have learned everything needed to perform a complete vulnerability assessment independently using Nessus and identify, analyze, and rank security vulnerabilities. What You Will Learn Explore unauthenticated/authenticated scans and network/web app scans Automate vulnerability scanning and write custom professional reports Understand the concepts of second opinion scanning Learn and perform a vulnerability scanning using Metasploit Learn to import the results of Nmap in Nessus Analyze/rank vulnerabilities and create a VA Project Worksheet Audience This course is designed to deliver content for penetration testers looking to build deeper knowledge of Nessus, cybersecurity enthusiasts desiring to learn more about vulnerability assessments, and freelancers wishing to add an in-demand skill to their profile. The prerequisites for the course include a computer/device with Windows/OSX/Linux. No programming or hacking knowledge is required. The ability to Google using intermediate to advanced skills for obtaining information is desirable. About The Author Avinash Yadav: Avinash Yadav is a young information security expert with a special focus on cybersecurity management as well as double-blind penetration testing. He brings his experience to the table through his passion for teaching. He has authored a couple of online courses with well-curated concepts and practicals on penetration testing and information security that the students can pursue to build up skills that are needed to be able to work in the cybersecurity domain rather than just focusing on random sources of information. He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!.
    Note: Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805124221 , 1805124226
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 794.8/151
    Keywords: Video games Programming ; UnrealScript (Computer program language) ; Computer programming ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course offers something for both aspiring game developers and enthusiasts looking to learn Unreal Engine 5. With over 250 modular assets, you can bring to life a medieval fantasy world complete with bustling towns, majestic castles, and intricate canal systems. You will learn unique techniques to create stylized structures, functional water systems with submergible boat assets, and animated native-enabled foliage to enhance the natural side of your world. The course covers a vast array of topics that guide you through every aspect of game development. You will learn to build entire towns and blacksmith shops with ease using the massive modular pack and create custom prop collections using blueprints to make your world come to life. In addition, you will learn to create a fully functional open-world system material with distance-based blending, noise masking, and automatic material transitions. The course also covers creating large-scale cities on the go with Modeling mode, deforming modular assets such as merging bridge pieces and bending bridges using a curved deformed. By the end of the course, you will be able to immerse yourself and your players in a fully functional medieval world of your own creation, whether it's a small village or an entire city. The possibilities are endless with the skills you will gain from this comprehensive course. What You Will Learn Build a medieval castle or city using modular assets Create complex environments with terrain and foliage Implement advanced lighting techniques for day and night scenes Learn how to use blueprints to create interactive elements Understand the basics of game mechanics and design Explore world-building principles and techniques Audience This course is perfect for 3D modelers, game designers, RPG fans, and anyone enthusiastic about Unreal Engine 5. Whether you are a beginner or an experienced designer, this course will teach you how to use a medieval castle kitbash comprising 241 individual pieces to build an entire castle or city. If you are excited about exploring the new and exciting changes in Unreal Engine 5, this course is a must for you. To benefit from the course, all you need is a computer with a downloaded version of Unreal Engine 5, and a thirst for learning 3D modeling, animation, and game engine integration. About The Author 3D Tudor Limited By Neil Ian Bettison: 3D Tudor Limited By Neil Ian Bettison, Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil's instructor style--his to-the-point instructions and clear guidance--makes him an excellent tutor. Neil uses Blender for particle effects and complex asset animation. Neil can use two popular game engines, Unreal Engine 5, and Unity, with many years of experience in both.
    Note: Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835083765 , 1835083765
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing ; Computer architecture ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Snowflake is a cloud-based data warehousing platform. It separates storage and computing, enabling fast and scalable analytics. Its architecture, ease of use, and SQL support make it popular for data management, efficiently processing large volumes of data, and enabling data-driven insights. In this introductory Snowflake course, we will explore the key concepts and functionalities of the cloud-based data warehousing platform. We will learn the basics of Snowflake, including its architecture, warehouses, and data-loading techniques. The lessons cover free trial sign-up, interface navigation, setting up warehouses using SQL, and creating database objects. Hands-on readings and quizzes reinforce your understanding. We focus on data loading in Snowflake, delving into COPY INTO, stages, transformations, and file format objects. We will explore loading data from various sources and applying transformations during the loading process. By the end of the course, we will be equipped with a foundational knowledge of Snowflake, capable of navigating its interface, setting up warehouses, and efficiently loading and processing data. This course serves as an excellent starting point for anyone looking to harness the power of Snowflake for data warehousing and analytics. What You Will Learn Understand Snowflake's three-layer model for scalability Create, configure, and optimize data warehouse setup Explore data loading hands-on with COPY INTO and stages Learn best practices for organization/management of data objects Utilize concurrency to improve multi-cluster warehouse performance Master SQL commands for data-driven, cloud-based analytics Audience This course caters to data architects, data engineers, and database administrators seeking to expand their knowledge of modern data technologies and cloud-based solutions like Snowflake. Additionally, data analysts, business intelligence professionals, IT experts, and aspiring data enthusiasts who want to learn about the latest cloud technologies and work with data efficiently will find value in this course. Whether beginners or experienced individuals, this course welcomes anyone interested in mastering Snowflake and unleashing the potential of cloud-based data warehousing. About The Author Nikolai Schuler: Nikolai Schuler, as a data scientist and BI consultant, believes that the data world benefits from new tools and technologies, but it is extremely difficult to get trained in the field as practical courses with quality content are rare or are structured incompatible with a busy working life. Nikolai's courses offer precious content and have an easy-to-follow structure. He aims to help anyone wishing to pursue their desired career by upgrading their data analysis skills. His courses have already found their audience in over 170 countries with numerous positive feedback and will equip you with the skillsets to master data science and analytics! If you are looking for qualitatively approachable training, then jump on board!.
    Note: "Published in August 2023.". - Online resource; title from title details screen (O'Reilly, viewed August 14, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835084304 , 1835084303
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 776
    Keywords: ChatGPT ; Computer art ; Generative art ; Artificial intelligence ; Technology and the arts ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Generative AI has revolutionized the art world by providing an entirely new way to create unique and stunning visuals. In today's age of technology, it's essential to keep up with the latest tools and techniques, and this is where this comprehensive course on AI-generated art comes in. In this course, you will learn how to create stunning visuals using the latest AI art software, including DALL-E, Midjourney, and other tools. You will begin by learning the basics of generative AI and its applications in art. From there, you will explore various AI art software and learn how to use them to create beautiful pieces of art. The course will cover everything from generating simple images to creating complex visuals and textures. You will learn how to tweak parameters, adjust styles, and create custom datasets to get the exact output you want. Additionally, you will explore the different types of generative art, including style transfer, GANs, and neural style transfer. By the end of this course, you will be well-versed in generative AI and its applications in art. You will have a solid understanding of how to use various AI art software, including DALL-E, Midjourney, and others, to create stunning visuals. What You Will Learn Understand the theory behind AI and GPT-3 Learn how to construct effective text prompts for AI art Learn different framing techniques for AI-generated art Explore different AI art software and their unique features Implement image URLs for visual inspiration in Midjourney Learn how to perform image masking with DALL-E 2 Audience This course is ideal for anyone who is interested in exploring the potential of generative AI art. Whether you are an artist, graphic designer, photographer, or simply a creative person, this course will equip you with the skills and knowledge to produce stunning and unique AI-generated artwork. No prior experience in programming or AI is required as this course is designed for beginners. About The Author Oliver Theobald: Oliver Theobald is an accomplished technical writer and the best-selling author of "Machine Learning for Absolute Beginners". With expertise in AI, fintech, and cloud computing, he has worked in various technical roles across the globe. Oliver currently splits his time between China and Japan, where he continues to expand his knowledge and passion for emerging technologies. As an instructor, Oliver brings a unique approach to teaching complex topics. He believes in cutting through the jargon and presenting information in a clear, concise, and engaging manner. His course content is designed to be easy to understand, yet powerful in its application. Whether you're an absolute beginner or an experienced professional, Oliver's goal is to help you build the skills and knowledge you need to succeed in your field.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805126096 , 1805126091
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: TypeScript (Computer program language) ; Web site development ; Application software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: TypeScript is an advanced programming language developed by Microsoft, serving as a superset of JavaScript. It provides optional static typing to define and enforce data types, early error detection during development. This enhances code reliability, readability, and maintainability, especially in large-scale web applications. Its compatibility with existing JavaScript codebases makes it a seamless choice for migration and collaboration. The course begins with TypeScript basics such as types, arrays, tuples, objects, and interfaces. The course progressively guides students through setting up React projects with TypeScript. Participants will gain hands-on experience in building React applications using TypeScript, covering topics such as JSX, components, hooks, and props. The course also demonstrates building various React components and functionalities using TypeScript. Learners gain practical experience by setting up React projects with TypeScript and converting existing React apps to TypeScript. The course emphasizes error prevention through static typing, enhancing code quality, and readability. Upon completion of the course, you will be proficient in leveraging TypeScript's powerful features to confidently create and maintain scalable and error-free React projects, making it a valuable resource for aspiring web developers. What You Will Learn Learn to write and compile TypeScript code Build JavaScript applications with TypeScript Use TypeScript types and interfaces to improve code quality Learn to set up React projects with TypeScript Develop React applications with TypeScript Converting existing React applications to TypeScript Audience The course is designed for individuals with some familiarity with JavaScript and want to enhance their skills by incorporating TypeScript into their workflow. It caters to those seeking to build robust and maintainable React apps, using the benefits of TypeScript's optional static typing for error prevention and improved code quality. Developers looking to gain practical experience in setting up React projects with TypeScript and converting existing apps to TypeScript will find this course valuable. About The Author Desmond Oben: Desmond Oben is a highly skilled and passionate JavaScript mentor, instructor, and freelance software developer. With an impressive instructor rating, he has already impacted the knowledge of students through his courses. Desmond's passion for IT and continuous pursuit of expertise have led him to gain extensive experience in the field. His adaptive nature allows him to quickly learn and adapt to new technologies and environments. To him, web development is an artistic journey, where a blank canvas becomes a masterpiece with strokes of coding. With a keen eye for creativity and an in-depth understanding of JavaScript, Desmond is dedicated to empowering aspiring developers with valuable insights and skills to succeed in the IT industry.
    Note: "Published in August 2023.". - Online resource; title from title details screen (O'Reilly, viewed August 14, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805126676 , 1805126679
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Vue (Electronic resource) ; Web applications Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This comprehensive course is your gateway to learning Vue.js, one of the most popular JavaScript frameworks renowned for its simplicity and flexibility. Starting with an introduction to Vue.js you will understand its unique features and advantages that have made it a top choice for web development. You will learn how to leverage Vue.js without installation. Next, you will dive into the installation and setup process, empowering you to create your own Vue.js projects. You will explore the powerful interpolation feature, allowing you to dynamically display data in your application. Events and parameters play a crucial role in Vue.js, enabling seamless communication between components. Two-way binding is a key feature of Vue.js, a seamless synchronization between data and user input. You will explore how to implement two-way binding with multiple inputs, offering a smooth user experience. Component reusability is a core concept in Vue.js, allowing you to build modular and scalable applications. You will learn how to create child components and establish data communication between parent and child components. Form handling is a fundamental aspect of web development. With Vue.js you will discover how to create simple and complete forms, implement form validation, and even integrate API data into your forms. As you progress, you will delve into computed properties, dynamic components, teleportation, and routing, expanding your capabilities and building more advanced applications. By the end of this course, you will have the knowledge and hands-on experience to build dynamic, responsive, and feature-rich web applications using Vue.js What You Will Learn Learn Vue.js interpolation, enabling you to display data within your application Learn to use methods and parameters to add interactivity to Vue.js components Learn the creation of child components in Vue.js Learn to pass data from child components to parent components Learn about routing and dynamic routing in Vue.js Implement form validation to ensure data integrity and user-friendly experiences Audience This course is tailored to a diverse range of individuals who are looking to take their skills in web development to the next level. It is ideal for ambitious students who are eager to surpass basic instruction levels and delve deeper into their learning journey. Programmers who are keen on acquiring the most in-demand web development ability will find this course invaluable. Developers who aspire to be among the top 10% of Vue developers will also greatly benefit from this course. You don't need any prior knowledge of Vue or any other JS framework to get started. However, it's a requirement you have at least a basic understanding of HTML, CSS, and JavaScript to complete this course. About The Author Meta Brains: Meta Brains is a team of passionate software developers and finance professionals. They provide professional training programs that combine their expertise in coding, finance, and Excel. With a focus on the Metaverse, they aim to equip learners with the necessary skills to participate in the next computing revolution. Their inclusive approach ensures accessibility to everyone, fostering a community that collaboratively codes and builds the future of the Metaverse.
    Note: "Published in June 2023.". - Online resource; title from title details screen (O'Reilly, viewed August 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835084298 , 183508429X
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Design and construction ; Computer networks Security measures ; Design and construction ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course provides a comprehensive overview of cybersecurity architecture, equipping students with the knowledge and skills needed to design and implement robust security solutions. The curriculum covers fundamental concepts and delves into practical aspects, enabling students to assess security risks, develop effective security controls, and apply security design patterns to real-world scenarios. Throughout the course, students will gain hands-on experience with a variety of security tools and technologies. They will learn essential skills such as threat modeling, risk assessment, security testing, and incident response. By exploring different security strategies and techniques, students will be prepared to address security challenges in diverse environments. Upon completion of this course, students will possess a deep understanding of cybersecurity architecture principles and best practices. They will be capable of designing, implementing, and managing comprehensive security solutions for various applications and settings. What You Will Learn Understand the roles and responsibilities of a security architect Learn the security principles and approaches Learn the various threat models available Explore the different enterprise architecture frameworks Learn about data protection and IAM Learn about reference security architecture Audience This course is best for cybersecurity professionals who want to become security architects and students who want to learn about security architecture. This course assumes a basic understanding of networking concepts and protocols, as well as some experience with programming and scripting languages. Students should also have some familiarity with common security tools and technologies, such as firewalls, intrusion detection/prevention systems, and vulnerability scanners. About The Author Alexander Oni: Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: "Published in July 2023.". - Online resource; title from title details screen (O'Reilly, viewed August 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835469538 , 1835469531
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Windows Azure Study guides Examinations ; Cloud computing Study guides Examination ; Cloud computing Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In today's technology-driven world, cloud computing is a game-changer, and Microsoft Azure stands at the forefront. Azure is the backbone of countless businesses, offering scalable, flexible, and secure cloud solutions. To navigate this landscape, understanding the fundamentals is paramount, and the AZ-900 certification is your ticket to Azure mastery. This course is your comprehensive guide to mastering Azure basics and conquering the AZ-900 exam. Starting with an introduction to cloud computing, you will grasp the benefits of cloud services and dive deep into Azure's core architectural components. You will explore compute and networking services, storage solutions, and identity and security in the Azure environment. Gain prowess in cost management, governance, compliance, and monitoring tools. The course also culminates with a detailed exploration of Azure Advisor, Azure Service Health, and Azure Monitor, giving you an arsenal of tools to optimize Azure resources. By the end of this course, you will be proficient in Azure cloud computing principles, well-prepared to ace the AZ-900 exam, and equipped to excel in the world of Microsoft Azure. What You Will Learn Understand core Azure principles and cloud computing fundamentals Create scalable Azure infrastructure with architectural components Explore Azure's compute, networking, and storage services in-depth Implement identity, access, and security features for Azure resources Build cost-efficient solutions while ensuring compliance and governance Master Azure monitoring tools for robust resource management Audience This course caters to both newcomers and aspiring cloud enthusiasts. If you're stepping into the world of cloud computing, seeking a strong foundation in Microsoft Azure fundamentals, or aiming to enhance your existing cloud knowledge, this course is designed for you. No prior experience with Azure or cloud computing is necessary. All that's required is your curiosity and willingness to learn. About The Author Praveenkumar Bouna: Praveenkumar Bouna is a software engineer with over 15 years of C# .NET development experience. He holds a Bachelor of Engineering in computer science and engineering. He has worked for about ten years in Honeywell, wherein he transitioned from software engineer to senior software engineer, tech lead, and so on in C#. He has also worked in security and surveillance as well as access control systems in top MNCs in the software industry. He is also a Certified ScrumMaster (CSM) and Scrum Master for a security R&D team. He is known for his simpler teaching approach toward explaining various complex topics his colleagues come across in everyday programming life.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465257 , 1835465250
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/040285536
    Keywords: Microsoft Project ; Project management Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Get started with this beginner friendly course on Microsoft Project for the Web. Start with exploring the diverse realm of project management tools as we unravel the intricacies of Microsoft Planner, Project Online, and Project for the Web. In addition to gaining a comprehensive understanding of these tools by dissecting their differences and applications, you will also delve into Microsoft Planner to master task management, from creating plans to organizing tasks effectively. Next, elevate your expertise with Project for the Web, where you will learn to create project plans from scratch, customize columns, and visualize progress within Microsoft Teams. In further videos, you will learn about the transformative potential of the Power Platform. You will explore Dataverse insights and the power of Power BI in data analysis. You will build insightful reports, modify visualizations, and assemble impactful dashboards for informed decision-making. Throughout the course, hands-on exercises reinforce your skills, ensuring practical mastery. By the end, you will be well-versed in leveraging these tools to streamline project management, foster collaboration, and enhance project outcomes. What You Will Learn Learn to navigate the Project for the Web interface Create a project using a template and from scratch Create new tasks and assign members to tasks Understand how visualizations are built and formatted Publish a report to the Power BI service Learn to navigate the Power BI interface Audience This beginner's course is tailored for individuals who are new to the field of project management or those seeking to enhance their foundational knowledge. Whether you are a student, a recent graduate, an entry-level professional, or someone transitioning into project management roles, this course is designed to provide you with a solid introduction to essential project management concepts and tools. About The Author Simon Sez IT: Simon Sez IT has offered technical courses for individuals, small businesses, and Fortune 500 companies since 2008, with thousands of employees who can benefit from the easy-to-learn and hands-on software training. It offers over 8,000 video tutorials on a range of software programs. Simon Sez IT ensures stress-free eLearning and enhanced employee productivity--whether you implement new software or a technological upgrade in your work environment. With over 600,000 students from 180 countries, Simon Sez IT is the preferred online learning choice for individuals and businesses worldwide.
    Note: "Updated September 2023.". - Online resource; title from title details screen (O'Reilly, viewed October 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...