Mostrando 2,201 - 2,220 Resultados de 4,542 Para Buscar '"Apiés"', tiempo de consulta: 0.12s Limitar resultados
  1. 2201
    Publicado 2017
    Tabla de Contenidos: “…. -- Using multiple cmdlets with the OnComplete API -- See also -- Scripting an Exchange server installation -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 3: Managing Recipients -- Introduction -- Performing some basic steps -- Creating, modifying, and removing mailboxes -- How to do it... -- How it works... -- There's more... -- Setting Active Directory attributes -- See also -- Working with contacts -- How to do it... -- How it works... -- There's more... -- See also -- Managing distribution groups -- How to do it... -- How it works... -- There's more... -- See also -- Managing resource mailboxes -- How to do it... -- How it works... -- There's more... -- Converting mailboxes -- See also -- Creating recipients in bulk using a CSV file -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico
  2. 2202
    Publicado 2023
    Tabla de Contenidos: “…Stress Cracking (HISC) Corrosion -- 5.5.1 HISC and Vulnerable Materials -- 5.5.2 HISC and Stress -- 5.5.3 HISC and Cathodic Protection -- 5.5.4 HISC and DNV Standard -- Questions and Answers -- Further Reading -- Chapter 6 Noise -- 6.1 Introduction to Sound -- 6.2 Introduction to Noise -- 6.3 Noise in Industrial Valves -- 6.3.1 Mechanical Noise and Vibration -- 6.3.2 Fluid Noise -- 6.3.2.1 Aerodynamic Noise -- 6.3.2.2 Hydrodynamic Noise -- 6.3.3 Noise Control Strategies -- 6.4 Noise Calculations for Pipes and Valves -- 6.4.1 Acoustic Fatigue Analysis -- 6.4.1.1 Sound Power Level Calculations -- 6.4.1.2 Mach Number -- 6.4.2 Noise in Control Valves -- 6.4.2.1 Aerodynamic Noise in Control Valves -- 6.4.2.2 Hydrodynamic Noise in Control Valves -- 6.4.3 Noise in Pressure Safety or Relief Valves -- 6.4.3.1 Calculation of Noise Emission According to ISO 4126-9 -- 6.4.3.2 Calculation of Noise Emission According to API 521 -- 6.4.3.3 Calculation of Noise Emission According to VDI 2713 -- Questions and Answers…”
    Libro electrónico
  3. 2203
    Publicado 2016
    Tabla de Contenidos: “…New Methods on All Arrays -- The find() and findIndex() Methods -- The fill() Method -- The copyWithin() Method -- Typed Arrays -- Numeric Data Types -- Array Buffers -- Manipulating Array Buffers with Views -- Similarities Between Typed and Regular Arrays -- Common Methods -- The Same Iterators -- The of() and from() Methods -- Differences Between Typed and Regular Arrays -- Behavioral Differences -- Missing Methods -- Additional Methods -- Summary -- Chapter 11: Promises and Asynchronous Programming -- Asynchronous Programming Background -- The Event Model -- The Callback Pattern -- Promise Basics -- The Promise Life Cycle -- Creating Unsettled Promises -- Creating Settled Promises -- Executor Errors -- Global Promise Rejection Handling -- Node.js Rejection Handling -- Browser Rejection Handling -- Chaining Promises -- Catching Errors -- Returning Values in Promise Chains -- Returning Promises in Promise Chains -- Responding to Multiple Promises -- The Promise.all() Method -- The Promise.race() Method -- Inheriting from Promises -- Promise-Based Asynchronous Task Running -- Summary -- Chapter 12: Proxies and the Reflection API -- The Array Problem -- Introducing Proxies and Reflection -- Creating a Simple Proxy -- Validating Properties Using the set Trap -- Object Shape Validation Using the get Trap -- Hiding Property Existence Using the has Trap -- Preventing Property Deletion with the deleteProperty Trap -- Prototype Proxy Traps -- How Prototype Proxy Traps Work -- Why Two Sets of Methods? …”
    Libro electrónico
  4. 2204
    Publicado 2023
    Tabla de Contenidos: “…Monitoring PIM -- Planning and configuring entitlement management -- Planning and configuring access reviews -- Summary -- Questions -- Further reading -- Chapter 5: Azure AD Identity Protection -- Understanding Identity Protection -- Protecting users with risk and registration policies -- Configuring user risk and sign-in risk policies -- Configuring MFA registration policies -- Configuring alert options -- Users at risk detected alerts -- Weekly digest -- Managing and resolving risk events -- Examining users at risk -- Examining risky sign-ins -- Examining risk detections -- Risky workload identities (preview) -- Risk-based Conditional Access policies -- Summary -- Questions -- Further reading -- Part 2: Implementing and Managing Threat Protection -- Chapter 6: Configuring a Microsoft Defender for Identity Solution -- Identifying the organizational need for MDI -- Understanding suspicious activity -- Exploring advanced attacks and malicious activities -- Understanding the MDI architecture -- Setting up MDI -- Prerequisites for MDI -- Installing and configuring MDI -- Additional configuration options -- Managing and monitoring MDI -- Entity tags -- Excluded entities -- Monitoring MDI -- Summary -- Questions -- Further reading -- Chapter 7: Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune -- Planning and implementing MDE -- Onboarding devices -- Managing and monitoring MDE -- Vulnerability management -- Partners and APIs -- Evaluation &amp -- tutorials -- Configuration management -- Implementing Microsoft Defender Application Guard, Application Control, and exploit protection -- Configuring Microsoft Defender Application Guard -- Configuring Microsoft Defender Application Control -- Configuring Microsoft Defender Exploit Guard -- Encrypting your Windows devices using BitLocker…”
    Libro electrónico
  5. 2205
    Publicado 2024
    Tabla de Contenidos: “…Use case 3 - real-time fraud detection -- Summary -- Questions -- Chapter 7: Concurrency in Java for Machine Learning -- Technical requirements -- An overview of ML computational demands and Java concurrency alignment -- The intersection of Java concurrency and ML demands -- Parallel processing - the key to efficient ML workflows -- Handling big data with ease -- An overview of key ML techniques -- Case studies - real-world applications of Java concurrency in ML -- Java's tools for parallel processing in ML workflows -- DL4J - pioneering neural networks in Java -- Java thread pools for concurrent data processing -- Achieving scalable ML deployments using Java's concurrency APIs -- Best practices for thread management and reducing synchronization overhead -- Generative AI and Java - a new frontier -- Leveraging Java's concurrency model for efficient generative AI model training and inference -- Summary -- Questions -- Chapter 8: Microservices in the Cloud and Java's Concurrency -- Technical requirements -- Core principles of microservices - architectural benefits in cloud platforms -- Foundational concepts - microservices architecture and its benefits in the cloud -- Real-world examples - Netflix's evolution and Amazon's flexibility -- Essential Java concurrency tools for microservice management -- Concurrency tools - an exploration of Java's concurrency tools that are tailored for microservices -- Challenges and solutions in microservices concurrency -- Bottlenecks - diagnosing potential challenges in concurrent microservices architectures -- Consistency - ensuring data consistency and smooth inter-service communication -- Resilience - achieving system resilience and fault tolerance -- Practical design and implementation - building effective Java microservices -- Strategic best practices - deploying and scaling microservices…”
    Libro electrónico
  6. 2206
    Publicado 2003
    Tabla de Contenidos: “…Technology options -- 5.1 Web client -- 5.1.1 Web browser -- 5.1.2 HTML -- 5.1.3 Dynamic HTML -- 5.1.4 CSS -- 5.1.5 JavaScript -- 5.1.6 Java applets -- 5.1.7 XML (client side) -- 5.1.8 XHTML 1.1 (HTML 4.01) -- 5.1.9 VoiceXML -- 5.1.10 XForms -- 5.1.11 XSLT -- 5.1.12 Mobile clients -- 5.2 Web application server -- 5.2.1 Java servlets -- 5.2.2 JavaServer Pages (JSPs) -- 5.2.3 JavaBeans -- 5.2.4 XML -- 5.2.5 Enterprise JavaBeans -- 5.2.6 Additional enterprise Java APIs -- 5.3 Integration technologies -- 5.3.1 Web services -- 5.3.2 J2EE Connector Architecture -- 5.3.3 Java Message Service -- 5.3.4 Message Oriented Middleware -- 5.3.5 Others -- 5.4 Where to find more information -- Chapter 6. …”
    Libro electrónico
  7. 2207
    por Nunes, Fabio Mazanatti
    Publicado 2013
    Tabla de Contenidos: “…Chapter 3: Java EE Basics - Persistence, Query, and Presentation -- The business scenario - movie ticket system -- Business entities of the system -- Organizing projects in Eclipse -- Creating the StoreBO project -- Generating classes from database tables -- Creating named queries -- Tweaking the persistence.xml file -- Packing the project -- The Store web project -- Adding references to PrimeFaces' shared library -- Adding references to StoreBO -- Referencing the persistence configuration file -- Creating a named bean -- Configuring the Web descriptor -- Defining the test page -- Deploying and testing the application -- Web resources -- Summary -- Chapter 4: Creating RESTful Services with JAX-RS -- Creating Theater entities -- Customizing the generated entities -- Creating named queries -- Preventing cyclic references -- Formatting exhibitions' date and time -- Completing the persistence.xml file -- Packaging the library -- Creating the Theater web application -- Setting up the project -- Enabling JAX-RS -- Exposing RESTful Services through JAX-RS -- Coding the API -- Testing the web service -- Creating the REST client -- Configuring JAX-RS client libraries and optional package -- Creating the web service consumer -- Updating the SearchManager bean -- Updating the query page -- Structuring the web application -- Applying templates through Facelets -- Creating an entity listing page -- Web resources -- Summary -- Chapter 5: Singleton Bean, Validations, and SOAP Web Services -- Using bean validation -- About built-in constraints -- Combining and grouping validation rules -- Creating a custom constraint -- Coding a constraint validator -- Showing validation messages -- Using the message component -- PrimeFaces's Growl -- Dealing with null and empty strings on JSF components -- Singleton session beans -- Implementing a singleton session bean…”
    Libro electrónico
  8. 2208
    Publicado 2017
    Tabla de Contenidos: “…The cryptocurrencies example -- A brief introduction to object-oriented programming -- The purpose of object-oriented programming -- Important concepts behind object-oriented languages -- Encapsulation -- Polymorphism -- Hierarchies -- Classes and constructors -- Public and private methods -- Interfaces, factories, and patterns in general -- Introducing three object models in R - S3, S4, and R6 -- The first source of confusion - various object models -- The second source of confusion - generic functions -- The S3 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The S4 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The R6 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- Active bindings -- Finalizers -- The architecture behind our cryptocurrencies system -- Starting simple with timestamps using S3 classes -- Implementing cryptocurrency assets using S4 classes -- Implementing our storage layer with R6 classes -- Communicating available behavior with a database interface -- Implementing a database-like storage system with CSV files -- Easily allowing new database integration with a factory -- Encapsulating multiple databases with a storage layer -- Retrieving live data for markets and wallets with R6 classes -- Creating a very simple requester to isolate API calls -- Developing our exchanges infrastructure -- Developing our wallets infrastructure -- Implementing our wallet requesters -- Finally introducing users with S3 classes -- Helping ourselves with a centralized settings file -- Saving our initial user data into the system -- Activating our system with two simple functions…”
    Libro electrónico
  9. 2209
    Publicado 2011
    Tabla de Contenidos: “…Using the Role Manager -- Summary -- Part VII: Building ASP.NET Applications -- 28 Maintaining Application State -- Using Browser Cookies -- Using Session State -- Using Profiles -- Summary -- 29 Caching Application Pages and Data -- Overview of Caching -- Using Page Output Caching -- Using Partial Page Caching -- Using DataSource Caching -- Using Data Caching -- Using SQL Cache Dependencies -- Summary -- 30 Localizing Applications for Multiple Languages -- Setting the Current Culture -- Using the CultureInfo Class -- Creating Local Resources -- Creating Global Resources -- Using the Localize Control -- Summary -- 31 Working with the HTTP Runtime -- Creating a Custom BuildProvider -- Creating a Custom ExpressionBuilder -- Creating HTTP Handlers -- Working with HTTP Applications and HTTP Modules -- Summary -- 32 Building Dynamic Data Applications -- Introducing ASP.NET Dynamic Data -- Building a Dynamic Data Application -- Working with Dynamic Data Templates -- Summary -- 33 Building ASP.NET MVC Applications -- Introducing the ASP.NET MVC Framework -- Creating Your First ASP.NET MVC Application -- Building an MVC Page -- Accepting Form Input -- Summary -- 34 Configuring Applications -- Overview of Website Configuration -- Using the Configuration API -- Creating Custom Configuration Sections -- Creating Encrypted Configuration Sections -- Summary -- 35 Deploying ASP.NET Web Applications -- Packaging Web Applications -- Using Web.config Transformations -- Deploying Databases -- One-Click Publishing Web Applications -- Summary -- Part VIII: Custom Control Building -- 36 Building Custom Controls -- Overview of Custom Control Building -- View State and Control State -- Processing Postback Data and Events -- Working with Control Property Collections -- Creating a Better Designer Experience -- Summary -- 37 Building Templated Databound Controls…”
    Libro electrónico
  10. 2210
    Publicado 2010
    Tabla de Contenidos: “…-- Chapter 3: Implementing DSLs -- Architecture of DSL Processing -- The Workings of a Parser -- Grammars, Syntax, and Semantics -- Parsing Data -- Macros -- Testing DSLs -- Handling Errors -- Migrating DSLs -- Chapter 4: Implementing an Internal DSL -- Fluent and Command-Query APIs -- The Need for a Parsing Layer -- Using Functions -- Literal Collections -- Using Grammars to Choose Internal Elements -- Closures -- Parse Tree Manipulation -- Annotation -- Literal Extension -- Reducing the Syntactic Noise -- Dynamic Reception -- Providing Some Type Checking -- Chapter 5: Implementing an External DSL -- Syntactic Analysis Strategy -- Output Production Strategy -- Parsing Concepts -- Mixing-in Another Language -- XML DSLs -- Chapter 6: Choosing between Internal and External DSLs -- Learning Curve -- Cost of Building -- Programmer Familiarity -- Communication with Domain Experts -- Mixing In the Host Language -- Strong Expressiveness Boundary -- Runtime Configuration -- Sliding into Generality -- Composing DSLs -- Summing Up -- Chapter 7: Alternative Computational Models -- A Few Alternative Models -- Chapter 8: Code Generation -- Choosing What to Generate -- How to Generate -- Mixing Generated and Handwritten Code -- Generating Readable Code -- Preparse Code Generation -- Further Reading -- Chapter 9: Language Workbenches -- Elements of Language Workbenches…”
    Libro electrónico
  11. 2211
    Publicado 2023
    Tabla de Contenidos: “…The knowledge base of the reporter -- Naming conventions -- False urgency -- Executive summary -- Breaking down and testing systems -- Breaking down hardware versus the operating system -- Breaking down a web API -- Understanding the steps -- The problems with this method of troubleshooting -- Previous and common events - checking for the simple problems -- Prior Root Cause Analysis (RCA) documents -- Timeline analysis -- Comparison -- The best approach -- Effective research both online and among peers -- The art of the Google search -- Skimming the content quickly and refining it -- Never forget your internal resources -- Breaking down source code efficiently -- Code you've never seen -- When that fails -- Logging plus code -- In practice - applying what you've learned -- Summary -- Chapter 6: Operational Framework - Managing Infrastructure and Systems -- Technical requirements -- Approaching systems administration as a discipline -- Design -- Installation -- Configuration -- App deployment -- Management -- Upgrade -- Uninstallation -- Understanding IT service management -- ITIL -- DevOps -- Seeing systems administration as multiple layers and multiple towers -- Automating systems provisioning and management -- Infrastructure as Code -- Immutable infrastructure -- In practice - applying what you've learned -- Lab architecture -- Lab contents -- Lab instructions -- Summary -- Further readings -- Chapter 7: Data Consumed - Observability Data Science -- Technical requirements -- Making data-driven decisions -- Defining the question and options -- Determining which data to use -- Identifying which data is already available -- Collecting the missing data -- Analyzing all datasets together -- Presenting the decision as a record -- Documenting the lessons learned in the process -- Solving problems through a scientific approach -- Formulation -- Hypothesis…”
    Libro electrónico
  12. 2212
    Publicado 2023
    Tabla de Contenidos: “…Deploying smart contracts -- The DAO -- Advances in smart contract technology -- Solana Sealevel -- Digital Asset Modeling Language -- Summary -- Chapter 9 : Ethereum Architecture -- Introducing Ethereum -- Cryptocurrency -- Keys and addresses -- Accounts -- Transactions and messages -- MPTs -- Transaction components -- Recursive Length Prefix -- Gas -- Transaction types -- Simple transactions -- Contract creation transactions -- Message call transactions -- Messages -- Transaction validation and execution -- State and storage in the Ethereum blockchain -- The world state -- The account state -- Transaction receipts -- Ethereum virtual machine -- Execution environment -- The machine state -- Blocks and blockchain -- The genesis block -- Block validation, finalization, and processing -- Block difficulty mechanism -- Nodes and miners -- The consensus mechanism -- Forks in the blockchain -- The Ethereum network -- Main net -- Test nets -- Private nets -- Precompiled smart contracts -- Programming languages -- Solidity -- Runtime bytecode -- Opcodes -- Wallets and client software -- Wallets -- Geth -- Light clients -- Supporting protocols -- Whisper -- Swarm -- Summary -- Chapter 10 : Ethereum in Practice -- Ethereum payments -- Innovations in Ethereum -- Difficulty time bomb -- EIP-1559 -- The merge and upcoming upgrades -- Programming with Geth -- Installing and configuring the Geth client -- Creating a Geth new account -- Querying the blockchain using Geth -- Geth console -- Geth attach -- Geth JSON RPC API -- Setting up a development environment -- Connecting to test networks -- Creating a private network -- Starting up the private network -- Experimenting with the Geth JavaScript console -- Mining and sending transactions -- Introducing Remix IDE -- Interacting with the Ethereum Blockchain with MetaMask -- Installing MetaMask…”
    Libro electrónico
  13. 2213
    Publicado 2024
    Tabla de Contenidos: “…-- The importance of data-driven insights in business -- An overview of Microsoft Dynamics 365 AI for Business Insights -- The objectives and structure of the book -- Summary -- Questions -- Answers -- Chapter 2: Microsoft Dynamics 365 AI Architecture and Foundations -- An overview of the architecture of Microsoft Dynamics 365 AI -- Cloud-based architecture -- AI technologies integration -- Modular components and microservices -- Data management and storage -- Security and compliance -- API and SDKs -- Real-time analytics engine -- Streamlined user interface -- Infrastructure resilience and fault tolerance -- Extensibility and future-proofing -- The key components and their interactions -- Data storage - the bedrock of AI -- AI models - the analytical engines -- Cognitive services - adding a layer of intelligence -- Integration interfaces - the connective tissue -- Cross-component collaboration - a symphony of interactions -- Business empowerment - the ultimate goal -- Scalability and adaptability - designed for growth -- Security and compliance across components -- Integration considerations and best practices -- Data integration - the starting point -- Security measures - non-negotiable -- Scalability - planning for growth -- Performance optimization - getting the most out of your system -- Documentation and training - the human element -- The iterative nature of integration -- Summary -- Questions -- Answers -- Part 2: Implementing Dynamics 365 AI Across Business Functions -- Chapter 3: Implementing Dynamics 365 AI for Sales Insights -- Leveraging AI for customer segmentation and targeting…”
    Libro electrónico
  14. 2214
    por Diamond, Stephanie
    Publicado 2024
    Tabla de Contenidos: “…Introducing AI-generated art -- Observing data visualization -- Looking at image enhancement -- Generating Audio and Voice -- Using voice assistants -- Generating music -- Turning text into speech -- Creating and Editing Videos -- Summarizing videos -- Adding special effects -- Using auto-editing tools -- Choosing the Right Output Type for Your Project -- Matching output to objectives -- Considering cost, complexity, and sophistication -- Chapter 3 Navigating the Leading Platforms -- Setting Up Accounts and Managing Usage -- Step 1: Choosing a platform -- Step 2: Creating an account -- Step 3: Choosing the best plan -- Step 4: Setting preferences -- Step 5: Customizing your experience -- Understanding the Terms of Service -- Understanding the data usage policy -- Looking at API limitations -- Taking care of content ownership -- Dealing with service availability -- Reading termination clauses -- Reviewing payment and refund policies -- Looking at the governing laws -- Updating terms -- Managing Data Privacy Concerns -- Adding AI to Your Current Tools and Workflow -- Looking at Some Real-World Examples of AI Tools -- Getting into Workflow Automation -- Discovering Cost-Saving Tips and Free Tools -- Reviewing pay-as-you-go and token systems -- Viewing community-supported and open-source options -- Choosing special deals and price cuts -- Reviewing pick-and-choose packages -- Paying attention to differing levels of pricing -- Considering free trials and freemium models -- Watching out for hidden costs -- Looking at Real-World Implementations -- Part 2 Mastering the Art of Prompting -- Chapter 4 Creating and Writing Successful AI Prompts -- Discovering the Importance of Prompts -- Maximizing the Benefits of Your AI Prompts -- Boosting productivity -- Enhancing creativity -- Improving collaboration -- Mitigating risk -- Fostering career advancement…”
    Libro electrónico
  15. 2215
    por Khan, Ian
    Publicado 2024
    Tabla de Contenidos: “…Regular Updates and Reviews -- Future Ethical Challenges in Prompt Engineering -- Sophistication of AI Responses -- Hyper-personalization -- Autonomy of AI Decisions -- Manipulative Prompts -- Inclusivity and Representation -- AI as a Social Actor -- Ethics of Emotional AI -- Privacy Erosion -- Economic and Employment Implications -- Deepfake and Reality Distortion -- Transparency and Accountability -- Regulation and Censorship -- Moral and Ethical Dilemmas -- Advanced Techniques: Automated Bias Detection -- Origins of Bias in AI -- Automated Bias Detection -- Benefits -- Techniques -- Challenges -- Ethical Considerations -- Applications in Prompt Engineering -- Case Studies: Search Engines -- The Road Ahead -- Chapter 8 Application-Specific Prompt Engineering -- Prompts for Creative Writing -- Bridging Human Imagination with AI -- Genre-Specific Prompts -- Inspiration and Idea Generation -- Character Development -- Dynamic Interaction -- Multimodal Applications -- Ethical Considerations -- Challenges and Limitations -- Future Potential -- Prompts for Business Applications -- Data Analysis and Insights -- Customer Support and Interaction -- Market Research and Consumer Insights -- Content Generation -- Financial Forecasting -- Personalization in Marketing -- Human Resources and Recruitment -- Ethical Implications -- Challenges -- Future Trajectories -- Prompts for Educational Uses -- Personalized Learning Paths -- Tutoring and Homework Assistance -- Language Learning -- Special Education Needs -- Interactive Simulations -- Assessment and Feedback -- Augmenting Classroom Discussions -- Historical and Cultural Contexts -- Challenges -- Ethical Implications -- Future Directions -- Prompts for Coding and Software Development -- Code Generation -- Debugging Assistance -- Code Optimization -- System Design and Architecture -- Integration and API Usage…”
    Libro electrónico
  16. 2216
    Publicado 2024
    Tabla de Contenidos: “…Account provisioning and deprovisioning -- Directory services -- Privileged access management -- Data and media sanitization -- Network security -- Zero trust networking -- Virtualization security -- Common threats -- Insufficient identity, credential, access, and key management -- Insecure interfaces and APIs -- Misconfiguration and inadequate change control -- Lack of cloud security architecture and strategy -- Insecure software development -- Unsecure third-party resources -- System vulnerabilities -- Accidental cloud data disclosure -- Misconfiguration and exploitation of serverless and container workloads -- Organized crime/hackers/APT -- Cloud storage data exfiltration -- Security hygiene -- Baselining -- Patching -- Comprehending Design Principles of Secure Cloud Computing -- Cloud secure data lifecycle -- Cloud based business continuity (BC) and disaster recovery (DR) planning -- Cost benefit analysis -- Functional security requirements -- Security considerations for different cloud categories -- IaaS security concerns -- PaaS security concerns -- SaaS security concerns -- Evaluating Cloud Service Providers -- Verifying against certification criteria -- ISO/IEC 27001 -- ISO/IEC 27002 -- ISO/IEC 27017 and ISO/IEC 27018 -- SOC 1, SOC 2, and SOC 3 -- Payment Card Industry Data Security Standard (PCI DSS) -- NIST SP 800-53 and FedRAMP -- Meeting system/subsystem product certifications -- Common Criteria -- FIPS 140-2 and FIPS 140-3 -- Chapter 5 Domain 2: Cloud Data Security, Part 1 -- Describing Cloud Data Concepts -- Cloud data lifecycle phases -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data dispersion -- Data flows -- Designing and Implementing Cloud Data Storage Architectures -- Storage types -- IaaS -- PaaS -- SaaS -- Threats to storage types -- Designing and Applying Data Security Technologies and Strategies…”
    Libro electrónico
  17. 2217
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding Cloud Deploy target types -- Using the Kubernetes manifest and Kustomization -- Using a Skaffold configuration -- Preparing your project -- Enabling the API -- Creating the GKE clusters -- Granting the necessary permissions -- Creating a delivery pipeline -- Understanding the progression -- Understanding targets -- Registering the delivery pipeline and targets -- Creating a release -- Examining a release -- Verifying your deployment -- Using a deployment strategy -- Configuring the deliver pipeline for a canary deployment -- Running the canary deployment -- Summary -- Chapter 9: Securing Your Runtimes with Binary Authorization -- Technical requirements -- Understanding Binary Authorization concepts -- Setting up Binary Authorization -- Creating a CMEK -- Setting up Binary Authorization on GKE -- Setting up Binary Authorization on Cloud Run -- Using Binary Authorization on GKE on other public clouds -- Setting up attestations -- Creating an attestation -- Configuring Binary Authorization policies -- Creating the policy -- Applying an attestation to the image -- Summary -- Part 4: Hands-On Secure Pipeline Delivery and Looking Forward -- Chapter 10: Demonstrating an End-to-End Software Delivery Pipeline -- Technical requirements -- Software delivery pipeline overview -- Building your software delivery pipeline -- Creating your source code repository -- Configuring the required IAM roles -- Creating two GKE clusters -- Creating GKE gateway resources -- Creating your Cloud Deploy delivery pipeline -- Configuring security policies for your pipeline -- Connecting your source code repository to Cloud Build -- Creating two Cloud Build triggers for your repository -- Creating your initial release -- Running your pipeline -- Updating your code as a developer…”
    Libro electrónico
  18. 2218
    Publicado 2024
    Tabla de Contenidos: “…Exploring AKS and its benefits -- Architecting Corda networks on AKS -- Design considerations for Corda network deployment -- Integrating your AKS configuration for Corda with additional Azure services -- Provisioning an AKS cluster for Corda -- Setting up an Azure subscription and preparing the prerequisites -- Deploying an AKS cluster with the appropriate Corda configuration -- Corda Enterprise in the Azure Marketplace -- Securing the AKS cluster and managing access controls -- Managing Corda nodes on AKS -- Scaling Corda nodes as Kubernetes pods -- Testing and validating the resilience of Corda networks on AKS -- Ensuring high availability and disaster recovery -- Performing failover tests in AKS -- Summary -- Further reading -- Chapter 8: Using the Ledger Features of Azure SQL -- Technical requirements -- Introduction to the ledger features of Azure SQL -- Use cases for SQL Ledger -- Creating a ledger in Azure SQL database -- Database ledger versus table ledger -- Benefits of the ledger features of Azure SQL -- Security and integrity -- Performance and scalability -- Using the ledger features of Azure SQL for blockchain solutions -- Supply chain traceability -- Certificate issuance and verification -- Asset ownership transfer -- Integrating the ledger features of Azure SQL with other Azure services -- Azure Functions -- Azure Logic Apps -- Azure Event Grid -- Azure Analysis Services -- Azure Machine Learning -- Power BI -- Azure API Management -- Azure Data Factory -- Best practices for implementing blockchain solutions with the ledger features of Azure SQL -- Summary -- Further reading -- Chapter 9: Leveraging Azure Confidential Ledger -- Technical requirements -- An introduction to ACL -- Use cases -- The features and benefits of ACL -- Using ACL for blockchain solutions -- Connecting and sending data to ACL…”
    Libro electrónico
  19. 2219
    Publicado 2023
    Tabla de Contenidos: “…DaemonSets -- Jobs -- CronJobs -- Ensuring resilience and high availability with Kubernetes resources -- Understanding advanced Pod application patterns -- Init containers -- Sidecar containers -- Ambassador containers -- Adaptor containers -- Verifying application health -- Understanding the execution of probes -- Termination of Pods -- Container life cycle hooks -- Resource management and scalability -- Horizontal Pod autoscaling -- Improving application security with Pods -- Security contexts -- Security best practices -- Labs -- Summary -- Chapter 10: Leveraging Application Data Management in Kubernetes -- Technical requirements -- Understanding the data within your application -- Applying configurations using ConfigMaps -- Using the downward API to inject configuration data -- Managing sensitive data using Secret resources -- Managing stateless and stateful data -- Using volumes for storing data -- Enhancing storage management in Kubernetes with PV resources -- Provisioning and decommissioning storage -- Labs -- Summary -- Chapter 11: Publishing Applications -- Technical requirements -- Understanding Kubernetes features for publishing applications cluster-wide -- Proxying and forwarding applications for debugging -- Kubernetes client proxy feature -- Kubernetes client port-forward feature -- Using the host network namespace for publishing applications -- Using the hostNetwork key -- Using hostPort -- Publishing applications with Kubernetes' NodePort feature -- Providing access to your Services with LoadBalancer Services -- Understanding Ingress Controllers -- Deploying an Ingress Controller -- Ingress resources -- Improving our applications' security -- Network policies -- Service mesh -- Labs -- Improving application access by deploying your own Ingress Controller…”
    Libro electrónico
  20. 2220
    Publicado 2024
    Tabla de Contenidos: “…Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Connecting to Data -- Introduction to Data -- Making the Most Out of This Book - Your Certification and Beyond -- Connecting to Sources -- Data Structure -- Choosing an Appropriate Data Source Type -- Content and Quality -- Level of detail: Dimensions and Measures -- Data Quality -- Technical Requirements -- Performance: Data Size and Structure -- Microsoft Excel (.xlsx) and Comma-Separated Values (.csv) Types -- Relational Databases -- Initial Data Connections -- Connecting to Tableau Server or Tableau Cloud -- Connecting to a File -- CSV and Excel Files -- .hyper or .tde Files -- JSON -- PDF -- Spatial Files -- Statistical Files -- Connecting to Databases and Cloud Services -- Default Server Connectors -- Custom SQL Queries -- Introduction to SQL and Custom Queries in Tableau -- Live versus Extract Connections -- Live Connections -- Data Extracts -- Other Factors Affecting Performance -- Connection Management: the Datasource Pane and Data Tab -- The Datasource Window -- The Data Tab -- Making New Connections in Existing Workbooks -- Replacing Data Sources -- Notes, Caveats, and Unsupported Data Sources -- Web-Based Data Access: Drivers and APIs -- Multidimensional Systems -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 2: Transforming Data -- Introduction -- Types of Fields in Tableau -- Data Types -- Data Type Conversion -- Dimensions and Measures -- Dimensions and Measure Field Conversion -- Discrete and Continuous -- Dimension, Measure, Discrete, and Continuous Combinations -- Discrete and Continuous Color Legends -- Cleaning Data -- Assessing Data Quality -- Cleaning data on Tableau Desktop -- Duplicating and Renaming a Field Updating the Aliases -- Updating the Default Properties of Fields -- Data Interpreter…”
    Libro electrónico