Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 484
- Cloud computing 470
- Arquitectura 461
- Engineering & Applied Sciences 377
- Application software 363
- Management 259
- Computer Science 247
- Arquitectes 203
- Arquitectura moderna 196
- Computer networks 188
- Computer software 177
- Database management 162
- Software architecture 156
- Data processing 140
- Electrical & Computer Engineering 134
- Security measures 134
- Examinations 129
- Telecommunications 128
- Web services 124
- Amazon Web Services (Firm) 121
- Microsoft .NET Framework 116
- Information technology 115
- Java (Computer program language) 109
- Big data 93
- Computer security 93
- Arquitectos 90
- Certification 90
- Electronic data processing 90
- Obras 90
- Architecture 82
-
4701Publicado 2024“…His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. …”
Video -
4702Publicado 2019“…By the end of the book, you will learn a lot of trips and tricks to automate your windows environment with PowerShell What you will learn Perform key admin tasks on Windows Server 2019 Employing best practices for writing PowerShell scripts and configuring Windows Server 2019 Use the .NET Framework to achieve administrative scripting Set up VMs, websites, and shared files on Azure Report system performance using built-in cmdlets and WMI to obtain single measurements Know the tools you can use to diagnose and resolve issues with Windows Server Who this book is for If you are a systems administrator, engineer, or an architect working with Windows Server 2016 interested in upgrading to Windows Server 2019 and automating tasks with PowerShell, then this book is for you. …”
Libro electrónico -
4703Publicado 2017“…Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you’re an architect, engineer, operator, or IT manager. Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies for network access, devices, accounting, and audit Configure device profiles, visibility, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step by step Apply best practices to avoid the pitfalls of BYOD secure access Set up efficient distributed ISE deployments Provide remote access VPNs with ASA and Cisco ISE Simplify administration with self-service onboarding and registration Deploy security group acc..…”
Libro electrónico -
4704Publicado 2017“…Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. …”
Libro electrónico -
4705Publicado 2008“…Finally, they carefully review the design and business considerations associated with architecting solutions based on CardSpace or any other user-centered identity management system. …”
Libro electrónico -
4706Publicado 2009“…Through a hands-on case study project, you’ll discover best practices for planning, architecting, and building Excel applications that are robust, secure, easy to maintain, and highly usable. …”
Libro electrónico -
4707Publicado 2022“…What you will learn Understand Microsoft Defender for Cloud features and capabilities Understand the fundamentals of building a cloud security posture and defending your cloud and on-premises resources Implement and optimize security in Azure, multi-cloud and hybrid environments through the single pane of glass - Microsoft Defender for Cloud Harden your security posture, identify, track and remediate vulnerabilities Improve and harden your security and services security posture with Microsoft Defender for Cloud benchmarks and best practices Detect and fix threats to services and resources Who this book is for This book is for Security engineers, systems administrators, security professionals, IT professionals, system architects, and developers. Anyone whose responsibilities include maintaining security posture, identifying, and remediating vulnerabilities, and securing cloud and hybrid infrastructure. …”
Libro electrónico -
4708Publicado 2022“…What you will learn Gain insight into the Operator Framework and the benefits of operators Implement standard approaches for designing an operator Develop an operator in a stepwise manner using the Operator SDK Publish operators using distribution options such as OperatorHub.io Deploy operators using different Operator Lifecycle Manager options Discover how Kubernetes development standards relate to operators Apply knowledge learned from the case studies of real-world operators Who this book is for This book is for DevOps and cloud engineers, Kubernetes engineers, SREs, developers, and cloud architects interested in automating the management of their Kubernetes clusters. …”
Libro electrónico -
4709Publicado 2022“…What you will learn Cover key capabilities of Amazon SageMaker relevant to deep learning workloads Organize SageMaker development environment Prepare and manage datasets for deep learning training Design, debug, and implement the efficient training of deep learning models Deploy, monitor, and optimize the serving of DL models Who this book is for This book is relevant for ML engineers who work on deep learning model development and training, and for Solutions Architects who design and optimize end-to-end deep learning workloads. …”
Libro electrónico -
4710Publicado 2023“…Pass the AZ-700 exam effortlessly with this comprehensive guide to Azure networking, covering all aspects of architecting, implementing, and managing Azure virtual networks Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesCreate and deploy a secure Azure network and implement dynamic routing and hybrid connectivityMaster Azure network design for performance, resilience, scalability, and securityEnhance your practical skills with hands-on labs aligned to the AZ-700 Network Engineer certificationBook DescriptionDesigning and Implementing Microsoft Azure Networking Solutions is a comprehensive guide that covers every aspect of the AZ-700 exam to help you fully prepare to take the certification exam. …”
Libro electrónico -
4711Publicado 2023“…What you will learn Uncover the foundation for modernizing continuous delivery and prepare for continuous delivery in cloud Build fast, efficient, secure, and interoperable software for real-world results Understand end-to-end continuous delivery for multi-cloud, hybrid, and on-premise Set up and scale continuous delivery in the cloud for maximum return Implement cost optimization for continuous delivery in the cloud Discover trends and advancements in CD with cloud-native technologies Who this book is for This book is for developers, site reliability engineers, DevOps architects, and engineers looking to strategize, plan, and implement continuous delivery in the cloud. …”
Libro electrónico -
4712Publicado 2024“…By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform. …”
Libro electrónico -
4713por Larman, Craig“…Foreword by Philippe Kruchten, the lead architect of the Rational Unified Process. "Too few people have a knack for explaining things. …”
Publicado 2002
Libro electrónico -
4714Publicado 2007“…You’ll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for: a comprehensive endpoint security strategy that works. …”
Libro electrónico -
4715por Fox, Dan“…It is a great resource for experienced architects and developers who are new to mobile solution development.” — Steve Milroy , Solutions Director, Mobility and Eme..…”
Publicado 2003
Libro electrónico -
4716Publicado 2002“…Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. …”
Libro electrónico -
4717Publicado 2008“…This book will be an indispensable resource for every network architect, administrator, and IT professional who works with virtual servers. …”
Libro electrónico -
4718Publicado 2003“…Decision-makers will learn how SyncML will drive new business models and the delivery of entirely new products and services. Software architects and project managers will discover how SyncML components can be integrated into complete solutions; and developers will learn how to maximize the performance, reliability, and scalability of those solutions. …”
Libro electrónico -
4719por Hohmann, Luke“….” — Jim Highsmith Director, Cutter Consortium author of Adaptive Software Development “Product development managers, marketing managers, architects, and technic..…”
Publicado 2003
Libro electrónico -
4720por Prahalad, C. K.“…Bill Gates, Chairman and Chief Software Architect,Microsoft "The Bottom of the Pyramid belongs at the top of the reading list forbusiness people, academics, and experts pursuing the elusive goal ofsustainable growth in the developing world. …”
Publicado 2005
Libro electrónico