Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Boston, MA : Safari  (27)
  • [Place of publication not identified] : Apress  (14)
  • Vidéos sur Internet
  • Computer networks ; Security measures
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    DDC: 174/.9004
    Keywords: DataKind (Firm) ; Information technology Moral and ethical aspects ; Technological innovations Moral and ethical aspects ; Data curation Moral and ethical aspects ; Electronic videos ; Innovations ; Aspect moral ; Édition de contenu ; Aspect moral ; Information technology ; Moral and ethical aspects ; Technological innovations ; Moral and ethical aspects ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Data scientists often set out to make a positive impact—generating insights upon which organizations can make decisions. A key aspect of that work is ensuring that data is being collected, managed, and analyzed ethically. But as conversations about ethical data science increase, so do questions about how ethics in data science looks in practice: When do you do an ethics check? And what do you do if something seems off? Join us for this Case Study with DataKind’s Afua Bruce and Rachel Wells to hear what happened when their team faced an ethical challenge during a project that used social media data. While wrapping up the project, the team found out that they didn’t have full information on how the data was obtained. Faced with the decision about whether to deliver the project to the partner when the data trail was incomplete, DataKind reviewed the data source’s use policies, unpacked the trade-offs of different approaches, and carefully communicated with all stakeholders to eventually terminate the project. Afua and Rachel take you through the decision-making process, trade-offs, outcomes, and lessons learned from this project experience; highlight the importance of a data trail and evaluating where all data sources come from; and explain how to walk back a data science solution and project when ethical issues arise. Recorded on January 25, 2022. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned.
    Note: Online resource; Title from title screen (viewed February 25, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 video file (26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3/82
    Keywords: iOS (Electronic resource) ; Application software Development ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Add support for different languages in your iOS apps. You'll start by constructing a basic user interface that's ready for multilingual support. Then add files with strings in different languages. Once you have the basics established, you'll learn to translate via code and also via storyboard. All languages are auto-picked according to each users' system settings. So that your users will always be interacting with your app in their native lan-guage. Adding support for multiple languages and adaptability to your apps will help reach wider audiences of users in different countries. Grow your userbase and support a more diverse and inclusive world! What You'll Learn Create simple UIs via storyboard Add strings in different languages Set app languages to the system device settings Who This Video Is For Intermediate to advanced Swift developers creating iOS apps with the expectation of a global audience.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 video file (43 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/33
    Keywords: Java (Computer program language) ; Java (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Learn the many new features, enhancements, and updated technologies in the recent long-term support (LTS) release of Java Platform, Standard Edition (Java SE) 17. This video offers an overview of the JDK Release Process, differences between the more frequent non-LTS and the less frequent LTS releases, and various kinds of features such as preview, experimental, incubation and stable. You will understand how to enable and use preview features, as well as the steps to download the latest Java Development Kit (JDK). You'll also gain insight into the deprecation plan of some unused or obsolete APIs which will streamline the future releases of Java SE platform. What You Will Learn Understand what you need to know before upgrading to Java 17 Get familiar with the Java release process Explore the new features and capabilities of Java SE 17 in detail Upgrade to Java SE 17 Enable and Evaluate Preview features of Java SE 17 Who This Video Is For New programmers and software developers, or even some experienced programmers and developers in Java who are new to Java 17.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.165
    Keywords: iOS (Electronic resource) ; Operating systems (Computers) ; Swift (Computer program language) ; Application software Development ; Systèmes d'exploitation (Ordinateurs) ; Swift (Langage de programmation) ; Logiciels d'application ; Développement ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Use a declarative approach to build UIs for iOS and macOS. Start with a review of what declarative programming is by building with SwiftUI. We will review all the basic SwiftUI components needed for a modern iOS app. Once we have a solid understanding of SwiftUI, we will cover reactive programming with the Combine framework. Understanding these components will allow us to incorporate SwiftUI with the Combine framework and make a fully declarative/reactive (MVVM) application. The goal is not to make you an expert but build a solid foundation of knowledge and instill the confidence to keep exploring these new technologies. With SwiftUI and the Combine framework, you can take a step closer to a Functional Reactive Programming development process. What You'll Learn Understand the relevant architectures and underlying components of Swift Work with SwiftUI to build basic UIs Build a full app with SwiftUI and the Combine framework Who This Video Is For Developers working on iOS or macOS apps. Familiarity with Swift is beneficial.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 video file (53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2762
    Keywords: JavaScript (Computer program language) ; JavaScript (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Learn how to build high-performing Java 17 applications using the GraalVM 21.3 Native Image compiler tool. You'll start with an introduction to GraalVM, then dive into its architecture and the benefits of running applications on GraalVM. This video also covers polyglot programming, and how to profile applications for analyzing its memory consumption and performance. What You Will Learn Get started with GraalVM while using JDK 17 Dive into GraalVM, its architecture and more Running code written in different languages on the same VM. Build a high-performing Java application with native image code and more Who This Video Is For Java programmers, software developers and engineers who are interested in learning about the capabilities of the GraalVM Native Image compiler tool. Prior experience with Java is recommended.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 41 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Application program interfaces (Computer software) ; Application software Development ; Computer multitasking ; Python (Langage de programmation) ; Interfaces de programmation d'applications ; Logiciels d'application ; Développement ; Fonctionnement multitâche ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Asynchronous Python Programming using asyncio and async/await lets you write code that runs many processes concurrently. It makes your code more responsive and stops it from wasting time waiting for slow file and internet access. It is simpler to write, easier to reason about, and uses less memory than threads and processes. We start the video with an overview of asyncio, showing the building blocks and core syntax in a few simple examples. Next, you will see how to make normal Python code work in an asynchronous environment, to minimize blocking and facilitate cooperative multi-tasking. Further, we cover an asyncio use-case working with network connections such as web servers using asynio's streams API, followed by communication between coroutines and synchronization of coroutines. We will also look at using the asyncio library to easily wrap blocking code into threads and processes, and some non-blocking replacement libraries used with asyncio such as aiohttp and aiofiles. The uvloop and unsync libraries will be discussed as ways to speed up and simplify your asyncio code. The following section covers writing more robust asyncio code to test and debug your code, handle stuck tasks using time out, logging and error handling and task management. Having gained a firm understanding of how to code using asyncio, the course finishes with a look under the hood. This starts by walking you through a hand-coded example of an event loop (the core of asyncio), an overview of the different types of awaitables and some useful functions of the event loop which gives you fine grain control What you will learn: What are the differences between asyncio, threads and processes How to run code concurrently using coroutines, asyncio, and async/await How to work with network connections using streams How to write robust and modern asynchronous code How asyncio works and how to use the low level functions for fine-grain control Who this video is for Intermediate to experienced Python programmers who want to speed up existing Python code and make it more responsive by using async/await and asyncio.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 online resource (1 video file (59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Microsoft software ; Electronic spreadsheets Computer programs ; Database management ; Logiciels Microsoft ; Tableurs ; Logiciels ; Bases de données ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: The introductory Excel tutorial covers topics related to entering data and demonstrates various ways of accepting and deleting data. You'll learn how to justify data within a cell and then have an opportunity to put it to practice. You will experiment with SmartLookup to search for anything on the Internet, whether it be Excel related or not, and then learn to place that information into an Excel pane. You will try out the Ribbon, a feature which drives the user-friendly resources in Excel. You'll learn the parts of the ribbon: tabs, groups, and command buttons and see how to hide and unhide the ribbon. Practice using short keys to run the commands and learn how to customize the ribbon to meet your needs. Add and remove commands, tabs and groups, change their order, add commands not normally used, then reset your ribbon back to the way it was before you made your changes. Finally, as Office 365 is is a product that regularly goes through changes, methods of getting help to stay up on the latest changes and support are demonstrated, including how to access Excel's built-in training videos. What you will learn • Know what Excel is and know some of its capabilities • Create, save, and open a workbook • Identify the current cell • Use the ribbon • Enter data in a worksheet • Get Help by using Screen Tips and the "Smart Lookup" feature This video is for anyone who wants to get up to speed on the many useful features and shortcuts of Excel.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    DDC: 005.74
    Keywords: Blockchains (Databases) ; Personal information management ; Electronic videos ; Chaînes de blocs ; Gestion d'informations personnelles ; Blockchains (Databases) ; Personal information management ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Healthcare providers spend billions of dollars annually on data management, yet provider directories often contain inaccuracies that dramatically increase the cost of care while reducing its quality. In response, Aetna, Humana, MultiPlan, Quest Diagnostics, and UnitedHealth Group have formed the Synaptic Health Alliance to explore the use of blockchain technology in tackling the challenge of accurate and efficient provider data management and sharing. Join us for this Case Study with UnitedHealthcare’s Meyrick Vaz to learn more about the Synaptic Health Alliance, better understand why it was founded, and explore the potential of blockchain for solving some of data management’s biggest challenges. You’ll examine the current state of provider data exchange as well as the goals, approach, and results of the initial pilot project for the alliance. Recorded on November 18, 2021. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned.
    Note: Online resource; Title from title screen (viewed November 18, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781803242231
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 24 min.)
    Edition: 1st edition
    DDC: 005.7565
    Keywords: Microsoft .NET Framework ; Streaming video ; Internet videos ; Database management ; Electronic videos ; Microsoft .NET Framework ; Vidéo en continu ; Vidéos sur Internet ; Bases de données ; Gestion ; streaming video ; Database management ; Internet videos ; Streaming video
    Abstract: Learn how to use and take advantage of the full feature set of Entity Framework Core in your .NET applications About This Video Construct a data model using code-first and database-first workflows Understand Entity Framework commands Handle one-to-one, one-to-many, and many-to-many relationships In Detail In this course, Entity Framework Core - A Full Tour, you will learn to work with data in your .NET applications. We will review the general benefits of using Entity Framework Core 5, which is Microsoft's flagship Object Relational Mapper (ORM), to relieve you of many concerns and challenges that come with this component of software development. We will also spend time discovering how EF Core translates classes and references to database models and relationships. You will learn how to write queries, update databases incrementally, roll back changes, and explore the myriad capabilities that Entity Framework Core affords us. By the end of this course, you will have the skills and knowledge of Entity Framework Core needed to fluidly interact with data and write quires for .NET Core applications with ease. Who this book is for This course is for students who want to learn Entity Framework in a hands-on way. In order to take this course, you should have at least 3 months experience of programming in C#. If you need to strengthen your C# fundamentals, you can take the C# beginner course, C# Console, and Windows Forms Development with LINQ & ADO.NET.
    Note: Online resource; Title from title screen (viewed September 29, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    DDC: 005.3
    Keywords: Application software Development ; Computer programs ; Observers (Control theory) ; Application program interfaces (Computer software) ; Cloud computing ; Electronic videos ; Logiciels d'application ; Développement ; Logiciels ; Observabilité (Théorie de la commande) ; Interfaces de programmation d'applications ; Infonuagique ; APIs (interfaces) ; Application program interfaces (Computer software) ; Application software ; Development ; Computer programs ; Cloud computing ; Observers (Control theory) ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Observability is a hot topic in software engineering, but how do we decouple what’s useful from the hype? This case study will examine how Lightstep engineering adopted new practices and tools, balancing trade-offs between the needs of a product-driven organization, a small–but quickly growing–team, and the demands of our customers. While there’s no single right answer to “how do you implement observability?” we considered the needs of developers and their experiences, as well as the needs of users, to help guide decisions to keep teams aligned and our customers happy. Join us for this Case Study with Lightstep co founder and chief architect Daniel “Spoons” Spoonhower to learn how Lightstep engineering adopted new practices and tools for observability while balancing trade-offs between the needs of a small but quickly growing product-driven organization and the demands of its customers. This case study is for you if... You’re an engineer or engineering leader that is responsible for software reliability and performance You’re looking to take responsibility for larger systems as well as mentor other engineers You’ve been responsible for production systems in some way, including being on-call, leading on-call teams, or possibly just responsible for debugging software and understanding software performance What you will learn—and how to apply it By the end of this case study the viewer will understand: Observability, how it enhances traditional monitoring, and why it matters to running software services today How observability complements DevOps practices and cloud-native technologies The role of OpenTelemetry and other open source software in observability And you will be able to: Deploy new practices and tools as part of a modern observability practice How to motivate the consistent use of tools and standards across their engineering organizations How to use SLOs to translate between technical constraints and business needs
    Note: Online resource; Title from title screen (viewed December 9, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781801810111
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 6 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Vidéo en continu
    Abstract: We cover everything you need to know in order to pass the current 2020 AWS Certified Solution Architect Associate SAA-C02 exam About This Video Understand the various advantages of the multi-tier design Learn about self-managed DB solutions Understand about AWS WAF and other tools In Detail An AWS Certification is one of the hottest IT certifications in the job market today! Get your AWS Certified Solutions Architect Associate certification and change your life. The world has been experiencing major changes in the last few years. Rather than running infrastructure on prep (on premise), companies are moving to the cloud. This course was created from the ground up for the new AWS certification exam. Make sure you're ready to pass the AWS Solutions Architect Associate exam by taking this course. This course includes the following: Concise, focused lectures on specific AWS concepts and technologies An organization that directly mirrors the official exam objectives Hands-on challenges that ensure you have mastered key concepts Amazon Web Services or AWS is one of the most important skills you need to gain in 2021. Don’t miss out on this opportunity to improve your career with cloud services. Who this book is for This course is for anyone who is preparing for AWS Certified Solution Architect Associate SAA-C02 exam. Anyone who’s interested in architecting solutions in AWS will also find the contents of this course useful.
    Note: Online resource; Title from title screen (viewed September 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 42 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; local ; Electronic videos ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Vidéo en continu
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 8+ Hours of Video Instruction Prepare for Microsoft Exam DA-100 and demonstrate your mastery of Power BI data analysis and visualization. This Exam DA-100: Analyzing Data with Microsoft Power BI video is designed for data analysts responsible for designing scalable data models, cleaning and transforming data, and presenting analytic insights through data visualizations using Power BI. This video focuses on the skills measured by the exam objectives, as updated by Microsoft on July 29, 2021. Prepare the data Model the data Visualize the data Analyze the data Deploy and maintain deliverables Using his years of experience teaching Power BI to a variety of learners, Microsoft Certified Trainer Chris Sorensen explains how to optimize Power BI features and functions and prepares you for what to expect on the DA-100 exam. In his engaging style grounded in real-world scenarios, Chris gives you insights to navigate and build effective Power BI solutions, quickly and effectively. With Chris as your guide, you are well-equipped to advance in your career as a data analyst. About the Instructor Chris Sorensen, CPA, CGA , is the Founder and President of Iteration Insights, a tech-enabled data analytics solutions provider based in Calgary, Alberta. He is a Microsoft Certified Data Analyst Associate and Microsoft Certified Trainer with a combined 20+ years of industry and teaching experience. In his career, he has led numerous Analytics projects in more than 15 industries across small to enterprise-sized organizations. As an adjunct instructor of the Business Intelligence program at SAIT, he plays a significant role in shaping new talent in Calgary’s emerging tech sector. Following his lifelong learning approach, Chris also coordinates both Power Platform and Azure Analytics User Groups, providing a space dedicated to knowledge-sharing and growing Alberta’s tech community. His favorite hashtag is #neverstoplearning. Skill Level Intermediate Who Should Take This Course Certification candidates preparing for Exam DA-100: Analyzing Data with Microsoft Power BI Data analysts who want to use Microsoft Power BI to maximize their data asse...
    Note: Online resource; Title from title screen (viewed August 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    DDC: 004.67/82
    Keywords: Amazon Web Services (Firm) ; Cloud computing ; Electronic videos ; Amazon Web Services (Firm) ; Infonuagique ; Cloud computing ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Though we have in the past depended on traditional data warehouses to drive business intelligence from data, they were generally based on databases and structured data formats, proving insufficient for the challenges that the current data driven world faces, especially the pace of data growth. Enter data lakes, which are optimized for unstructured and semi-structured data, can scale to PetaBytes easily, and allow better integration of a wide range of tools to help businesses get the most out of their data. There are few important properties worth understanding about data lakes. They include: Support for unstructured and semi-structured data. Scalability to PetaBytes and higher. SQL-like interface to interact with the stored data. Ability to connect various analytics tools as seamlessly as possible. Combine decoupled storage and analytics tools. Data volumes have grown to new scales and the demands of businesses have become more ambitious. For example, users now expect faster query times, better scalability, ease of management and so on. Former big data tools like Hadoop, Hive, and HDFS have made way for new and better technology platforms. Data and software professionals are now moving towards a disaggregated architecture, with Storage and Analytics layers very loosely coupled using REST APIs. This makes each layer much more independent (in terms of scaling and management) and allows using the perfect tool for each job. For example, in this disaggregated model, users can choose to use Spark for batch workloads for analytics, while using Presto for SQL heavy workloads, with both Spark and Presto using the same backend storage platform. This approach is now rapidly becoming the standard. Commonly used storage platforms include object storage platforms like AWS S3, Azure Blob Storage, Google Cloud Storage (GCS), Ceph, MinIO among others. Analytics platforms vary from simple Python & R based notebooks to Tensorflow to Spark, Presto to Splunk, Vertica and others. This case study will explain how California State University applied DataOps techniques in their current environments to create reusable, scalable and extensible data architectures. We will discuss strategies to build a data lakehouse architecture to rapidly scale and deploy use cases in your current environments. This case study is for you if... You want to learn how to apply scalable data architecture techniques in a data processing environment. You're a data Architect/ System Architect,...
    Note: Online resource; Title from title screen (viewed November 2, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 53 min.)
    Edition: 1st edition
    DDC: 387.1/09714/27
    Keywords: Cargo handling Case studies ; Harbors Case studies ; COVID-19 Pandemic, 2020- ; Natural language processing (Computer science) ; Artificial intelligence ; Natural Language Processing ; Artificial Intelligence ; Electronic videos ; COVID-19 Pandemic ; (2020-) ; Pandémie de COVID-19, 2020- ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Artificial intelligence ; Cargo handling ; Harbors ; Natural language processing (Computer science) ; Québec ; Montréal ; Case studies ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: During the first months of the COVID-19 pandemic, it became crucial to prioritize shipments of critical cargo. In 2020 the Port of Montreal implemented an AI tool for the supply chain—in just six months from preparation to pilot delivery—with the goal of providing advance visibility to supply chain stakeholders by detecting critical cargo (e.g., masks, sanitizer, etc.). Join us for this Case Study with telecommunications engineer and AI advisor Adrian Gonzalez Sanchez to explore the tool and discover how it performed in practice. You’ll learn how pragmatic innovation (e.g., focusing on specific AI tasks, using only mature techniques, defining the “good enough” results in advance, etc.) and a common goal can lead to successful AI implementation. O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned. Recorded on November 9, 2021. See the original event page for resources for further learning or watch recordings of other past events. O'Reilly Case Studies explore how organizations have overcome common challenges in business and technology through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and challenges while hearing their unique perspectives, insights, and lessons learned.
    Note: Online resource; Title from title screen (viewed November 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135305300 , 0135305306
    Language: English
    Pages: 1 online resource (1 video file, approximately 29 hr., 50 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Electronic videos ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Vidéos sur Internet
    Abstract: 26+ Hours of Video Instruction Overview CompTIA A+ Core 2 (220-1002) Complete Video Course is a unique video product that provides a solid understanding of A+ skills. The purpose of these videos is to act as quick, concise, hands-on training that is easily absorbed. In this best-selling author and instructor-led course you will get coverage of every objective and topic in the CompTIA A+ Core 2 (220-1002) exam. It is also full of hands-on demos so you can see real hardware and software presentations. David Prowse walks you through the details you need to not only pass the test but troubleshoot and fix real hardware, software, and network problems for your career. The author also includes tech tips throughout to give you insider info on troubleshooting, repair, and maintenance. This title can be used as your sole resource for learning the material needed to study for and pass the test. You can also use this as a supplement to other A+ training. There are a total of four domains that map to the main objectives of the CompTIA A+ Core 2 (220-1002) exam. These domains contain 33 lessons with video totaling more than 26 hours of hands-on demonstrations, audio instruction, animations, whiteboard training, and video screencasting. He includes hands-on configuration labs; laptop, smartphone, and device hardware labs; and live-action troubleshooting labs. The 33 video lessons are broken down into four domains and cover the following topics: Operating Systems Security Software Troubleshooting Operational Procedures About the Instructor David L. Prowse is an author, a computer specialist, and a technical trainer. He loves computer technology and enjoys sharing with others what he has learned. Over the past decade, he has authored more than a dozen titles for Pearson, including books such as CompTIA A+ Exam Cram and Security+ Cert Guide, and videos such as the A+ Complete Video Course. He has more than 20 years of technology experience spanning a variety of roles, and tries to share as much of this experience with his readers (and watchers) as possible. In addition, he has taught many computer courses including CompTIA A+, Network+, and Security+ to more than 2,000 students, both in the classroom and via the Internet. He runs a support website for all of his products at https://dprocomputer.com. Topics include Domain 1: Operating Systems Domain 2: Security Domain 3: Software Troubleshooting Domain 4: Operational Procedures Skill Level Beginne...
    Note: Online resource; Title from title screen (viewed January 2, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson | Boston, MA : Safari
    ISBN: 9780136875185 , 0136875181
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 20 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Electronic videos ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. C++20 Fundamentals LiveLessons with Paul Deitel is a code-oriented presentation of C++, one of the world,Äôs most versatile and powerful programming languages. C++ remains hugely popular for the development of systems software, embedded systems, operating systems, real-time systems, communications systems and other high performance computer applications. C++20 Fundamentals LiveLessons is comprehensive and covers all major versions of C++, including: C++11, C++17, and C++20. The code repository for this LiveLesson is kept at https://github.com/pdeitel/CPlusPlus20FundamentalsLiveLessons and will be kept up to date as lessons are added and as changes are made.
    Note: Online resource; Title from title screen (viewed June 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780136823483 , 0136823483
    Language: English
    Pages: 1 online resource (1 video file, approximately 9 hr., 30 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 9 Hours of Video Instruction The Exam AZ-104 Microsoft Azure Administrator (Video) offers full coverage of the MS AZ-104 exam so you can learn everything you need to know to pass the exam. Coverage includes cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust, with the goal of passing the AZ-104 Exam. Description The Exam AZ-104 Microsoft Azure Administrator (Video) offers 9 full hours of video training on all core concepts in the AZ-104 exam so you can fully understand cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust. It will prepare Azure Administrators to implement, monitor, and maintain Microsoft Azure solutions, including major services related to compute, storage, network, and security. With 9 hours of hands-on demonstrations, it will provide the knowledge necessary to pass the exam and become Microsoft Certified: Microsoft Azure Administrator. With years of IT experience, numerous publications under his belt, and a wealth of expertise teaching in the field, Michael Shannon is uniquely qualified to prepare students for the Microsoft Azure Administrator AZ-104 exam. Topics include: Module 1: Manage Azure subscriptions and resources Module 2: Implement and manage storage Module 3: Deploy and manage virtual machines (VMs) Module 4: Configure and manage virtual networks Module 5: Manage identities About the Instructor Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT, he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, and Pearson, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He is the senior technical instructor for Skillsoft Corporation, specializing in all things cloud and security. Skill Level Intermediate/Advanced Learn How To Manage Azure subscriptions and resources Implement and manage storage Deploy and manage virtual machines (VMs) Configure and manage virtual networks Manage identities Who Should Take...
    Note: Online resource; Title from title screen (viewed June 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839214486 , 1839214481 , 9781839216992
    Language: English
    Pages: 1 online resource (330 pages)
    Edition: 1st edition
    DDC: 658.478
    Keywords: Cyberterrorism ; Business enterprises Computer networks ; Security measures ; Computer security ; Electronic books ; local ; Cyberterrorisme ; Sécurité informatique ; Cyberterrorism ; Computer security ; Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures
    Abstract: Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book Description The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.
    Note: Online resource; Title from title page (viewed February 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780136721246 , 0136721249
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 19 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 6+ Hours of Video Instruction Overview The AWS Certified Solutions Architect - Associate (SAA-C02) Complete Video Course is designed to provide users with more than 6 hours of instruction with the goal of fully preparing them for all aspects of the exam. The course walks through the exam objective coverage in a way that is easy to digest, apply in the workplace, and implement for the exam. The course instructor, Chad Smith, is an experienced and certified architect with a focus on AWS. The course provides walk-throughs of the exam objectives as well as best strategies and demonstrations for optimal application. Each lesson ends with two sample questions, which are explained in detail for both correct and incorrect answers. The four domains of the AWS SAA-C02 exam align with Modules 2 through 5 of this course to provide the best outcome for the learner intending to take—and pass—the AWS Certified Solutions Architect – Associate (SAA-C02) Exam. Topics include Module 1: AWS Certified Solutions Architect Overview Module 2: Design Resilient Architectures Module 3: Design High-Performing Architectures Module 4: Specify Secure Applications and Architectures Module 5: Design Cost-Optimized Architectures About the Instructor Chad Smith is the principal cloud architect at Brightkey.cloud. He is a certified architect for both Amazon Web Services and Google Cloud Platform and brings a wealth of relevant experience in cloud adoption, infrastructure design, data security, and cloud operations. Chad holds current AWS certifications in Architecture (Associate and Professional), SysOps, and Security. Skill Level Intermediate to advanced Learn How To Use architectural patterns to design resilient, highly available, and decoupled infrastructures Deploy high-performance compute, network, storage, and database resources Design least-privilege access control and secure application tiers, and deploy data protection mechanisms for encryption in transit and at rest Recognize cost-effective compute, network, storage, and database implementation Pass the AWS Certified Solutions Architecture Associate SAA-C02 exam Who Should Take This Course AWS architects AWS SysOps professionals AWS security professionals AWS developers and engineers Intermediate to advanced students Course Requirements Strong understanding of the AWS ecosystem and infrastructure architecture Working knowledge of commonly used AWS services such as EC2, S3, IAM, Cloudwatch, et...
    Note: Online resource; Title from title screen (viewed March 9, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781801070676
    Language: English
    Pages: 1 online resource (1 video file, approximately 25 hr., 3 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; local ; Vidéo en continu ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: A compendium of SwiftUI code for any scenario from the blockbuster bestseller "SwiftUI for Masterminds" by J.D. Gauchat About This Video Delve into the framework and tools of SwiftUI Learn how to build applications for iOS and macOS with less code Get to grips with the techniques of declarative programming In Detail Do you want to learn the SwiftUI framework to build modern, stylish, and robust applications for Apple devices? This course will help you do that. The course starts with an introduction to the Swift language and gives you an overview of application development using Swift. Next, you will learn all about the fundamental concepts of Swift, such as operators, variables, functions, methods, strings, arrays, memory management, error handling, and a lot more. Moving along, you will get a solid understanding of the SwiftUI framework and the Xcode interface and learn how to use a declarative user interface. Next, you will learn to work with control views, navigation views, and lists. Moving ahead, you will learn to implement graphics, animations, gestures, and notifications in your applications. Next, you will understand how to manipulate data in your applications and in the cloud. Towards the end, you will learn to integrate the UIKit framework with SwiftUI and learn the steps to publish your application to the App Store. By the end of this course, you will be well versed with the SwiftUI framework and be able to implement it while developing applications for macOS and iOS.
    Note: Online resource; Title from title screen (viewed December 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135305331 , 0135305330
    Language: English
    Pages: 1 online resource (1 video file, approximately 34 hr., 4 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 21+ Hours of Video Instruction Overview CompTIA A+ Core 1 (220-1001) Complete Video Course is a unique video product that provides a solid understanding of A+ skills. The purpose of these videos is to act as quick, concise, hands-on training that is easily absorbed. In this best-selling author and instructor-led course you will get coverage of every objective and topic in the CompTIA A+ Core 1 (220-1001) exam. It is also full of hands-on demos so you can see real hardware and software presentations. David Prowse walks you through the details you need to not only pass the test, but troubleshoot and fix real hardware, software, and network problems for your career. The author also includes Tech Tips throughout to give you insider info on troubleshooting, repair, and maintenance. This title can be used as your sole resource for learning the material needed to study for and pass the test. You can also use this as a supplement to other A+ training. Five domains map to the main objectives of the CompTIA A+ Core 1 (220-1001) exam. These domains contain 37 lessons with video totaling more than 21 hours of hands-on demonstrations, audio instruction, animations, whiteboard training, and video screencasting. The videos also include the author building a computer live on camera so you can see first-hand how to accomplish this key task. He also includes hands-on configuration labs; laptop, smartphone, and device hardware labs; and live-action troubleshooting labs. The 37 video lessons are broken down into five domains and cover the following topics: Mobile Devices Networking Hardware Virtualization and Cloud Computing Hardware and Network Troubleshooting Topics include Domain 1: Mobile Devices Domain 2: Networking Domain 3: Hardware Domain 4: Virtualization and Cloud Computing Domain 5: Hardware and Network Troubleshooting Skill Level Beginner You Will Learn All the objectives in the CompTIA A+ Core 1 (220-1001) exam Test-taking techniques with interactive practice quizzes, performance-based simulations, and hands-on exercises How to build a computer, perform networking tasks, configure laptops and mobile devices, and perform troubleshooting ta...
    Note: Online resource; Title from title screen (viewed June 24, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 52 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Wow! A brand new set of techniques to study and apply. The videos are great, amazingly organized, and go step by step to introduce such a complex topic. Arnaldo Ayala, Software Architect, Consultores Informáticos The Keras package for R brings the power of deep learning to R users. Deep Learning with R in Motion locks in the essentials of deep learning and teaches you the techniques you'll need to start building and using your own neural networks for text and image processing. Instructor Rick Scavetta takes you through a hands-on ride through the powerful Keras package, a TensorFlow API. You'll start by digging into case studies for how and where to use deep learning. Then, you'll master the essential components of a deep learning neural network as you work hands-on through your first examples. You'll continue by exploring dense and recurrent neural networks, convolutional and generative networks, and how they all work together. And that's just the beginning! You'll go steadily deeper, making your network more robust and efficient. As your work through each module, you'll train your network and pick up the best practices used by experts like expert instructor Rick Scavetta, Keras library creator and author of Deep Learning in Python François Chollet , and JJ Allaire , founder of RStudio, creator of the R bindings for Keras, and coauthor of Deep Learning in R ! You'll beef up your skills as you practice with R-based applications in computer vision, natural-language processing, and generative models, ready for the real-world. Machine learning has made remarkable progress in recent years. Deep learning systems have revolutionized image recognition, natural-language processing, and other applications for identifying complex patterns in data. The Keras library provides data scientists and developers working in R a state-of-the-art toolset for tackling deep learning tasks! Inside: The 4 steps of Deep Learning Using R with Keras and TensorFlow Working with the Universal Workflow Computer vision with R Recurrent neural networks Everyday best practices Generative deep learning You'll need intermediate R programming skills. No previous experience with machine learning or deep learning is assumed. Rick Scavetta is a biologist, workshop trainer, freelance data scientist, cofounder of Science Craft, and founder of Scavetta Academy, companies dedicated to helping scientists better understand and visualize their data. Rick's practical, hands-on exposur...
    Note: Online resource; Title from title screen (viewed August 28, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780135971673 , 0135971675
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 32 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 6+ Hours of Video Instruction More than 6 hours of video instruction to help you manage your organization’s Windows 10 desktops and prepare for Exam MD-101 Managing Modern Desktops; one of the exams required to achieve Microsoft 365 Certified: Modern Desktop Administrator Associate. Overview This engaging, self-paced instructional video course demonstrates how to deploy and update operating systems, manage policies and profiles, protect devices, and manage apps and data. If you’re planning to take Exam MD-101 Managing Modern Desktops, this video course covers the exam objective domains published by Microsoft in a logical way for learning the technology and preparing for the exam. Throughout each lesson, Microsoft certified trainer and technical author Andrew Warren describes key concepts and puts them into action with demonstrations and real-world scenarios. About the Instructor Andrew Warren has more than 30 years of experience in the IT industry, many of which he has spent teaching and writing. He is a Microsoft Certified Trainer and has been involved as a subject matter expert in many of the Windows Server 2016 courses and as the technical lead in many Windows 10 courses. He also has been involved in developing TechNet sessions about Microsoft Exchange Server. He is the co-author of Exam Ref MD-100 Windows 10 , Exam Ref MD-101 Managing Modern Desktops , Exam Ref 70-741 Networking with Windows Server 2016 , and Exam Ref 70-742 Identity with Windows Server 2016 published by Microsoft Press. Andrew is based in the United Kingdom and lives in rural Somerset where he runs his own IT training and education consultancy. Skill Level Intermediate Learn How To Deploy and update operating systems Manage policies and profiles Manage and protect devices Manage apps and data Who Should Take This Course IT professionals who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment IT professionals who manage identity, access, policies, updates, and apps IT professionals who want to explore new and updated features in Windows 10 Candidates preparing for Exam MD-101 Managing Modern Desktops Course Requirements Experience deploying, configuring, and maintaining Windows 10 and non-Windows devices Familiarity with M365 workloads
    Note: Online resource; Title from title screen (viewed October 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484243404
    Language: English
    Pages: 1 online resource (1 streaming video file (1 hr., 13 min.)) , digital, sound, color
    Keywords: Hacking ; Penetration testing (Computer security) ; Computer networks ; Security measures ; Computer security ; Electronic videos ; local
    Abstract: "Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail."--Resource description page.
    Note: Title from resource description page (Safari, viewed January 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484243480
    Language: English
    Pages: 1 online resource (1 streaming video file (1 hr., 5 min., 27 sec.)) , digital, sound, color
    Keywords: Hacking ; Penetration testing (Computer security) ; Computer networks ; Security measures ; Computer security ; Electronic videos ; local
    Abstract: "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page.
    Note: Title from resource description page (Safari, viewed January 18, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484243411
    Language: English
    Pages: 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.)) , digital, sound, color
    Keywords: Hacking ; Computer security ; Penetration testing (Computer security) ; Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page.
    Note: Title from resource description page (Safari, viewed January 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484238523
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Third edition.
    Keywords: Computer security ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You'll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don't really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves-step by step, without judgment, and with as little jargon as possible.
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed October 9, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484238707
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer security ; Management ; Computer networks ; Security measures ; Cyberspace ; Security measures ; Computer crimes ; Electronic books ; local ; Electronic books
    Abstract: Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You'll Learn Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team Who This Book Is For Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed October 23, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    ISBN: 9781484232583
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: The expert's voice in cybersecurity
    Keywords: Computer security ; Computer crimes ; Prevention ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats . The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum-what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit-gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You'll Learn Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to ev...
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9781484236277
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer security ; Information technology ; Security measures ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN-savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks
    Note: Description based on online resource; title from cover (Safari, viewed July 9, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469098050
    Language: English
    Pages: 1 online resource (27662 pages)
    Edition: 1st edition
    DDC: 658.4/78
    Keywords: Computer networks Security measures ; Computer security ; Computer Security ; Audiobooks ; Sécurité informatique ; BUSINESS & ECONOMICS ; General ; Computer networks ; Security measures ; Computer security ; Downloadable audio books ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Audiobooks ; Livres audio
    Abstract: Fascinating and highly readable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. This book helps businesses: - Understand the threats they face - Assess the resilience of their networks against attacks - Identify and address weaknesses - Respond to exploits swiftly and effectively Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail-no matter what strikes.
    Note: Online resource; Title from title page (viewed April 18, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135229415 , 0135229413
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 31 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Six and a half Hours of Video Instruction More than six hours of video instruction covering the knowledge necessary to pass the AWS Solutions Architect Associate certification exam, including an in-depth review of AWS architecture principles and best practices, and technical details pertaining to the implementation of services in accordance with the Well Architected Framework as published by Amazon Web Services. The AWS Certified Solutions Architect Associate Complete Video Course was developed specifically for the latest edition of the exam released in February of 2018. The AWS Solutions Architect Associate certification is ideal for anyone in a solutions architect or similar technical role, and this course is designed to help you pass the AWS Certified Solutions Architect Associate exam. We will cover all the key areas addressed in the exam and review a number of use cases designed to help you ingrain the principles and practices on which this certification is based so that you have an intellectual framework with which to formulate the correct answers. We will use a combination of demonstrations, architectural diagram walkthroughs, and case studies to help you understand the tools available to you for passing the exam. Throughout this course you will gain a deeper understanding of AWS architecture following the five pillars of the Well-architected framework. Demonstrations of Amazon Web Services and third-party cloud solutions are included to provide a clear guide to understanding the services offered by Amazon Web Services and the needs those services meet. Quizzes are also offered to help viewers gauge their ability to understand and retain the information presented. Topics include: Lesson 1: Solutions Architect Associate Certification Lesson 2: High Availability Lesson 3: Network Topology Lesson 4: Application Design Lesson 5: Network Performance Lesson 6: Compute Performance Lesson 7: Storage Performance Lesson 8: Database Performance Lesson 9: Leveraging Managed Services Lesson 10: Identity and Access Management Lesson 11: Detection Lesson 12: Securing Infrastructure Lesson 13: Securing Data Lesson 14: Cost Optimization Lesson 15: Operational Excellence About the Instructor Richard A. Jones is a certified AWS Solution Architect and an experienced instructor having taught the IT teams of numerous Fortune 500s and postgraduate students at the University of Colorado. Programming since age 10, Richard has spent more than 25 years furthering...
    Note: Online resource; Title from title screen (viewed July 6, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Windows Azure ; Computer networks ; Security measures ; Cloud computing ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. What You'll Learn This book provides step-by-step guidance on how to: Support enterprise security policies Improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures Who This Book Is For IT, cloud, and security administrators; CEOs, CIOs, and other business professionals
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed November 12, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 60 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video
    Abstract: You're working on a new product or project, or you’re trying to overhaul an existing one. You know you have to learn more about your customers—what problems they're trying to solve, their abilities and frustrations, and (most importantly) how they'll make the decision to buy—or not buy— your future product. This Learning Path will prepare you to conduct your first highly effective customer interview; you’ll learn how to create a “hypothesis,” how to get people to speak freely, how to best take notes on what they say, and how to share what you've learned with your team.
    Note: Online resource; Title from title screen (viewed March 30, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780134540221 , 0134540220
    Language: English
    Pages: 1 online resource (1 video file, approximately 55 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: The supplemental video for the product CCNA Routing and Switching ICND2 200-105 Official Cert Guide
    Note: Online resource; Title from title screen (viewed April 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780134540238 , 0134540239
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 24 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: The supplemental video for the product CCENT/CCNA ICND1 100-105 Official Cert Guide
    Note: Online resource; Title from title screen (viewed April 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (447 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity—including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the most effective methods for combating the invidious corruption that, if unchecked, puts all nations at risk. Maximilian Edelbacher will be appearing at three upcoming events: June 28, 2012: Roundtable in the House of the European Union in Vienna on the topic "Financial Crimes: A Threat to European Security?" October 8, 2012: Roundtable in Joannneum, Austria on the topic "Financial Crimes: A Threat to Global Security" October 9, 2012: Book presentation at the Hans Gross Museum in Graz, Austria
    Note: Online resource; Title from title page (viewed April 19, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...