Mostrando 961 - 980 Resultados de 1,440 Para Buscar '"Azur ', tiempo de consulta: 0.15s Limitar resultados
  1. 961
    Publicado 2015
    Tabla de Contenidos: “…Using a Debugger to Intercept Passwords -- Purchased Products -- Password change policies -- Auditing failed logins -- Renaming the SA account -- Disabling the SA account -- Securing endpoints -- Certificate Endpoint Authentication -- Stored procedures as a security measure -- Access to Base Tables Is Not Required -- Enabling Cross Database Chaining -- Minimum permissions possible -- Instant file initialization -- Linked servers -- Securing Linked Servers -- Using SQL Server Management Studio for Linked Server Security Configuration -- Using T-SQL for Linked Server Security Configuration -- Only Allowing Some Groups to Use a Linked Server -- Using policies to secure your instance -- SQL azure specific settings -- Instances that leave the office -- Securing AlwaysOn availability groups -- Securing contained databases -- Contained Databases and AlwaysOn -- SQL CLR -- Extended stored procedures -- Protecting your connection strings -- Database firewalls -- Clear virtual memory pagefile -- User access control (UAC) -- Other domain policies to adjust -- Summary -- Chapter 7 - Analysis Services -- Information in this chapter: -- Logging into analysis services -- Granting Administrative Rights -- Granting Rights to an Analysis Services Database -- Securing analysis services objects -- Data Sources -- Cubes -- Cell Data -- Dimensions -- Dimension Data -- Mining Structures -- Summary -- Chapter 8 - Reporting Services -- Information in this chapter -- Setting up SSRS -- Service Account -- Web Service URL -- Database -- Report Manager URL -- Email Settings -- Execution Account -- Encryption Keys -- Scale-out Deployment -- Logging onto SQL Server Reporting Services for the first time -- Security within reporting services -- Item Roles -- System Roles -- Adding System Roles -- Adding Folder Roles -- Reporting services authentication options…”
    Libro electrónico
  2. 962
    Publicado 2019
    Tabla de Contenidos: “…Chapter 18 Conducting Post-Incident Reviews -- Going beyond Root Cause Analysis -- Stepping through an Incident -- Succeeding at Post-Incident Reviews -- Scheduling it immediately -- Including everyone -- Keeping it blameless -- Reviewing the timeline -- Asking tough questions -- Acknowledging hindsight bias -- Taking notes -- Making a plan -- Part 5 Tooling Your DevOps Practice -- Chapter 19 Adopting New Tools -- Integrating with Open Source Software -- Opening community innovation -- Licensing open source -- Deciding on open source -- Transitioning to New Languages -- Compiling and interpreting languages -- Parallelizing and multithreading -- Programming functionally -- Managing memory -- Choosing languages wisely -- Chapter 20 Managing Distributed Systems -- Working with Monoliths and Microservices -- Choosing a monolithic architecture first -- Evolving to microservices -- Designing Great APIs -- What's in an API -- Focusing on consistent design -- Containers: Much More than Virtual Machines -- Understanding containers and images -- Deploying microservices to containers -- Comparing orchestrators: Harmonize the hive -- Configuring containers -- Monitoring containers: Keeping them alive until you kill them -- Securing containers: These boxes need a lock -- Chapter 21 Migrating to the Cloud -- Automating DevOps in the Cloud -- Taking your DevOps culture to the cloud -- Learning through adoption -- Benefitting from cloud services -- Cumulus, Cirrus, and Steel: Types of Clouds -- Public cloud -- Private cloud -- Hybrid cloud -- Cloud as a Service -- Infrastructure as a Service -- Platform as a Service -- Software as a Service -- Choosing the Best Cloud Service Provider -- Amazon Web Services (AWS) -- Microsoft Azure -- Google Cloud Platform (GCP) -- Finding Tools and Services in the Cloud -- Part 6 The Part of Tens…”
    Libro electrónico
  3. 963
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Part 1: Migrating to the Cloud -- Chapter 1: Introduction to Cloud Transformation -- Introduction to the cloud -- The origins of cloud computing -- Key characteristics of cloud computing -- On-demand self-service -- Wide range of network access -- Multi-tenant model and resource pooling -- Rapid elasticity -- PAYG model -- Measured service and reporting -- Understanding the motivators for cloud adoption -- Resilience -- Advanced security -- Carbon footprint reduction -- Improved optimization and efficiency -- Faster innovation and business agility -- Understanding CSPs -- Amazon Web Services (AWS) -- Microsoft Azure -- Google Cloud Platform -- Alibaba Cloud -- Exploring the service models - SaaS, PaaS, and IaaS -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Software as a service (SaaS) -- Exploring the deployment models - public, private, hybrid, multi, and community -- The public cloud -- The private cloud -- The hybrid cloud -- Multi-cloud -- The community cloud -- Comparison between the different cloud deployment models -- Summary -- Further reading -- Chapter 2: Understanding Cloud Migration -- Cloud migration - key concepts and fundamentals -- What is cloud migration? …”
    Libro electrónico
  4. 964
    Publicado 2023
    Tabla de Contenidos: “…-- Tips and tricks for running your code on Cloud Run -- Choosing the best serverless option for each use case -- Summary -- Further reading -- Chapter 6: Running Containerized Applications with Google Kubernetes Engine -- Introducing Google Kubernetes Engine -- Deep diving into GKE - key concepts and best practices -- GKE cluster architecture -- Advanced cluster management features -- GKE operation modes -- Cluster types based on availability -- Node pools and node taints for easier management -- Best practices for cost efficiency in GKE -- Storage in GKE -- Networking in GKE -- Security in GKE -- Deploying applications on GKE -- Scaling an app in GKE -- Monitoring GKE applications -- Comparing GKE and Cloud Run - when to use which -- GKE hands-on example -- Summary -- Further reading -- Chapter 7: Managing the Hybrid Cloud with Anthos -- The pitfalls of choosing a cloud provider -- Introducing hybrid cloud computing -- Anthos, the hybrid cloud management platform -- Computing environment -- Simplified management using fleets -- Service Mesh for microservice architectures -- Networking in Anthos -- Centralized configuration management -- Securing containerized workloads -- Binary Authorization for a secure software supply chain -- Consolidated logging and monitoring -- Unified UI -- Making hybrid cloud simple with Cloud Run for Anthos -- Third-party application marketplace -- Anthos usage and pricing options -- Anthos hands-on example -- Running our example on Microsoft Azure -- Cleaning up -- Summary -- Further reading -- Part 3: Extending Your Code - Using Google Cloud Services and Public APIs -- Chapter 8: Making the Best of Google Cloud Networking -- Introducing Google Cloud networking -- Understanding regions and zones -- Choosing the best region and zone -- Connecting to our cloud resources…”
    Libro electrónico
  5. 965
    por Gazit, Lior
    Publicado 2024
    Tabla de Contenidos: “…Data that is not pre-embedded -- Chains -- Agents -- Long-term memory and referring to prior conversations -- Ensuring continuous relevance through incremental updates and automated monitoring -- Reviewing a simple LangChain setup in a Jupyter notebook -- Setting up a LangChain pipeline with Python -- LLMs in the cloud -- AWS -- Microsoft Azure -- GCP -- Concluding cloud services -- Summary -- Chapter 9: Exploring the Frontiers: Advanced Applications and Innovations Driven by LLMs -- Technical requirements -- Enhancing LLM performance with RAG and LangChain - a dive into advanced functionalities -- LangChain pipeline with Python - enhancing performance with LLMs -- Advanced methods with chains -- Asking the LLM a general knowledge question -- Requesting output structure - making the LLM provide output in a particular data format -- Evolving to a fluent conversation - inserting an element of memory to have previous interactions as reference and context for follow-up prompts -- Retrieving information from various web sources automatically -- Retrieving content from a YouTube video and summarizing it -- Prompt compression and API cost reduction -- Prompt compression -- Experimenting with prompt compression and evaluating trade-offs -- Multiple agents - forming a team of LLMs that collaborate -- Potential advantages of multiple LLM agents working simultaneously -- Concluding thoughts on the multiple-agent team -- Summary -- Chapter 10: Riding the Wave: Analyzing Past, Present, and Future Trends Shaped by LLMs and AI -- Key technical trends around LLMs and AI -- Computation power - the engine behind LLMs -- The future of computational power in NLP -- Large datasets and their indelible mark on NLP and LLMs -- Purpose - training, benchmarking, and domain expertise -- Value - robustness, diversity, and efficiency…”
    Libro electrónico
  6. 966
    por Hurley, William
    Publicado 2023
    Tabla de Contenidos: “…Finding Waldo in a Sea of Striped Hats -- Grabbing That Cash -- Insuring That Quantum Makes Its Mark -- Making the World Go Round with Logistics -- Dreaming of Machines Learning -- Searching for the New Oil in Quantum -- Making Materialism Matter -- Simulating Our Way to Better Health -- Finding New Pharmaceuticals -- Forecasting Future Fog -- Chapter 14 Quantum Computing Algorithms -- Mapping Quantum Computing Algorithms to Applications -- Understanding the Basics of Quantum Algorithms -- Mapping algorithms to use cases -- Investing in research -- Visiting the Quantum Zoo -- Finding New Kinds of Time -- Starting with the Deutsch-Jozsa Algorithm -- Making Shor Quantum Computing Will Be Big -- Searching with Grover -- Using the Quantum Phase Estimation Algorithm -- Applying Simon's Algorithm -- Implementing the Quantum Fourier Transform (QFT) Algorithm -- Stepping into Vaidman's Quantum Zeno Effect -- Getting Linear with the HHL Algorithm -- Solving and Simulating with QAOA -- Getting Grounded with VQE -- Assessing Additional Algorithms -- Identifying What's Ahead -- Chapter 15 Cloud Access Options -- Exploring the Major Types of Options -- Grouping public cloud providers -- Examining quantum computer manufacturers -- Looking at access providers -- Noting the Importance of Amazon Braket -- Counting on Azure Quantum -- Investigating Google Quantum AI -- Opening Quantum Computer Vendor's Portals -- Unlocking Quantum Potential with Strangeworks -- Perusing a classical catalog of quantum technologies -- Exploring compute providers -- Understanding managed applications -- Chapter 16 Educational Resources -- Connecting with Online Classes -- MIT Quantum Information Sciences -- Quantum Cryptography -- The Quantum Internet and Quantum Computers: How Will They Change the World? …”
    Libro electrónico
  7. 967
    por Dowswell, Kurt
    Publicado 2024
    Tabla de Contenidos: “…Chapter 8 Code Refactoring with Copilot -- Introducing Code Refactoring with Copilot -- Establishing the Example Project -- Prerequisites -- Refactoring Duplicate Code -- Adding Unit Tests -- Refactoring Duplicate Error Handling Code -- Refactoring Validators -- Adding Unit Tests -- Extracting Validation Code to Functions -- Refactoring Bad Variable Names -- Documenting and Commenting Code -- Method Documentation -- Project Documentation -- Conclusion -- Chapter 9 Enhancing Code Security -- Detailing Code Security -- Establishing the Example Project -- Prerequisites -- Exploring Code Security -- Using HTTPS -- Implementing Validation -- Conclusion -- Finding and Fixing Security Issues -- Fixing Weak Password Hashing -- Fixing SQL Injection -- Conclusion -- Chapter 10 Accelerating DevSecOps Practices -- Detailing DevSecOps -- Simplifying Containers -- Creating a Container -- Deploying a Container -- Applying Security Controls -- Automating Infrastructure as Code -- Creating IaC -- Deploying Code Using Terraform -- Applying Security Controls -- Streamlining CI/CD Pipelines -- Creating CI Pipeline -- Adding Security Scanning -- Creating CD Pipeline -- Conclusion -- Chapter 11 Enhancing Development Environments with Copilot -- Amplifying Visual Studio with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension -- Exploring Code Completions -- Chatting with Copilot -- Elevating Azure Data Studio with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension -- Constructing Database Schemas with Copilot -- Inserting Test Data with Copilot -- Querying with Copilot -- Boosting JetBrains IntelliJ IDEA with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension -- Exploring Code Completions -- Chatting with Copilot -- Enhancing Neovim with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension…”
    Libro electrónico
  8. 968
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Adversarial AI -- Chapter 1: Getting Started with AI -- Understanding AI and ML -- Types of ML and the ML life cycle -- Key algorithms in ML -- Neural networks and deep learning -- ML development tools -- Summary -- Further reading -- Chapter 2: Building Our Adversarial Playground -- Technical requirements -- Setting up your development environment -- Python installation -- Creating your virtual environment -- Installing packages -- Registering your virtual environment with Jupyter notebooks -- Verifying your installation -- Hands-on basic baseline ML -- Simple NNs -- Developing our target AI service with CNNs -- Setup and data collection -- Data exploration -- Data preprocessing -- Algorithm selection and building the model -- Model training -- Model evaluation -- Model deployment -- Inference service -- ML development at scale -- Google Colab -- AWS SageMaker -- Azure Machine Learning services -- Lambda Labs Cloud -- Summary -- Chapter 3: Security and Adversarial AI -- Technical requirements -- Security fundamentals -- Threat modeling -- Risks and mitigations -- DevSecOps -- Securing our adversarial playground -- Host security -- Network protection -- Authentication -- Data protection -- Access control -- Securing code and artifacts -- Secure code -- Securing dependencies with vulnerability scanning -- Secret scanning -- Securing Jupyter Notebooks -- Securing models from malicious code -- Integrating with DevSecOps and MLOps pipelines -- Bypassing security with adversarial AI -- Our first adversarial AI attack -- Traditional cybersecurity and adversarial AI -- Adversarial AI landscape -- Summary -- Part 2: Model Development Attacks -- Chapter 4: Poisoning Attacks -- Basics of poisoning attacks -- Definition and examples…”
    Libro electrónico
  9. 969
    Publicado 2018
    Tabla de Contenidos: “…-- Using Data Migration Assistant -- Limitations of using Stretch Database -- Limitations that prevent you from enabling the Stretch DB features for a table -- Table limitations -- Column limitations -- Limitations for Stretch-enabled tables -- Use cases for Stretch Database -- Archiving of historical data -- Archiving of logging tables -- Testing Azure SQL database -- Enabling Stretch Database -- Enabling Stretch Database at the database level -- Enabling Stretch Database by using wizard -- Enabling Stretch Database by using Transact-SQL -- Enabling Stretch Database for a table -- Enabling Stretch DB for a table by using wizard -- Enabling Stretch Database for a table by using Transact-SQL -- Filter predicate with sliding window -- Querying stretch databases -- Querying and updating remote data -- SQL Server Stretch Database pricing -- Stretch DB management and troubleshooting -- Monitoring Stretch Databases -- Pause and resume data migration -- Disabling Stretch Database -- Disable Stretch Database for tables by using SSMS -- Disabling Stretch Database for tables using Transact-SQL -- Disabling Stretch Database for a database -- Backing up and restoring Stretch-enabled databases -- Summary -- Chapter 7: Temporal Tables -- What is temporal data? …”
    Libro electrónico
  10. 970
    Publicado 2018
    Tabla de Contenidos: “…-- Epics -- Features -- Stories -- Maintain your backlog -- The Speaker Meet problem -- Meaningful separation -- Speakers -- Communities -- Conferences -- Separate by team function -- Technical separations -- Technical requirements -- React web user interface -- .NET Core -- .NET Web API -- Entity Framework -- Azure -- Database -- An N-Tiered hexagonal architecture -- Hexagonal architecture -- Basic yet effective N-Tiered divisions -- Service layer -- Microservices -- Data access layer -- Repository Pattern -- Generic repository -- User interface adapter layer -- User interface layer -- Front-end business layer -- Front-end user interface layer -- Front-end data source layer -- Testing direction -- Back-to-front -- Defining a data source -- Creating a business layer -- Building a user interface -- Front-to-back -- Defining a user interface -- Creating a business layer -- Building a data source -- Inside out -- Defining a business layer -- Summary -- Chapter 7: Test-Driving C# Applications -- Reviewing the requirements -- Speaker listing -- API -- API tests -- Moq -- Testing exception cases -- Service -- Service tests -- Clean tests -- Repository -- The IRepository interface -- FakeRepository -- Using factories with the FakeRepository…”
    Libro electrónico
  11. 971
    Publicado 2018
    Tabla de Contenidos: “…Restoring, migrating, and taking over a gateway -- Gateway log files -- Performance Monitor counters -- Scheduled data refresh -- DirectQuery datasets -- Single sign-on to DirectQuery sources via Kerberos -- Live connections to Analysis Services models -- Azure Analysis Services refresh -- Dashboard cache refresh -- Summary -- Chapter 10: Deploying the Power BI Report Server -- Planning for the Power BI Report Server -- Feature differences with the Power BI service -- Parity with SQL Server Reporting Services -- Data sources and connectivity options -- Hardware and user licensing -- Pro licenses for report authors -- Alternative and hybrid deployment models -- Report Server reference topology -- Installation -- Hardware and software requirements -- Analysis Services Integrated -- Retrieve the Report Server product key -- Migrating from SQL Server Reporting Services -- Configuration -- Service Account -- Remote Report Server Database -- Office Online Server for Excel Workbooks -- Upgrade cycles -- Report Server Desktop Application -- Running desktop versions side by side -- Report Server Web Portal -- Scheduled data refresh -- Data source authentication -- Power BI mobile applications -- Report server administration -- Securing Power BI report content -- Execution logs -- Scale Power BI Report Server -- Summary -- Chapter 11: Creating Power BI Apps and Content Distribution -- Content distribution methods -- Power BI apps -- Licensing apps -- App deployment process -- User permissions -- Publishing apps -- Installing apps -- Apps on Power BI mobile -- App updates -- Dataset-to-workspace relationship -- Self-Service BI workspace -- Self-Service content distribution -- Risks to Self-Service BI -- Sharing dashboards and reports -- Sharing scopes -- Sharing versus Power BI apps -- SharePoint Online embedding -- Custom application embedding…”
    Libro electrónico
  12. 972
    Publicado 2017
    Tabla de Contenidos: “…-- Using Data Migration Assistant -- Limitations of using Stretch Database -- Limitations that prevent you from enabling the Stretch DB feature for a table -- Table limitations -- Column limitations -- Limitations for Stretch-enabled tables -- Use cases for Stretch Database -- Archiving of historical data -- Archiving of logging tables -- Testing Azure SQL database -- Enabling Stretch Database…”
    Libro electrónico
  13. 973
    Publicado 2017
    Tabla de Contenidos: “…Note continued: Manage container images using Microsoft Azure -- Summary -- Thought Experiment -- Thought Experiment answer -- Skill 5.1 Implement high availability and disaster recovery options in Hyper-V -- Implement Hyper-V Replica -- Implement live migration -- Implement shared nothing live migration -- Configure CredSSP or Kerberos authentication protocol for Live Migration -- Implement storage migration -- Skill 5.2 Implement failover clustering -- Implement workgroup, single, and multi domain clusters -- Configure quorum -- Configure cluster networking -- Restore single node or cluster configuration -- Configure cluster storage -- Implement cluster-aware updating -- Implement cluster operating system rolling upgrade -- Configure and optimize clustered shared volumes (CSVs) -- Configure clusters without network names -- Implement Scale-Out File Server (SoFS) -- Determine different scenarios for the use of SoFS vs. clustered file server…”
    Libro electrónico
  14. 974
    Publicado 2024
    Tabla de Contenidos: “…Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Configuring and Managing a Microsoft Teams Environment -- Chapter 1: Planning and Configuring Network Settings for Microsoft Teams -- Making the Most Out of This Book - Your Certification and Beyond -- Technical Requirements -- Calculating Network Bandwidth Capacity for Teams Voice, Video, Meetings, and Town Halls -- Analyzing Network Impact Using Network Planner -- Exercise 1.1: Assessing Network Readiness for Using Teams -- Specifying Required Network Ports and Protocols for Microsoft Teams -- Specifying Optimal Network Architecture for Teams -- Content Delivery Network Utilization -- Integrating Tenant Data and Reporting Labels -- Exercise 1.2: Uploading Tenant Data to CQD -- Exercise 1.3: Configuring Reporting Labels -- QoS -- Exercise 3.3: Configuring QoS for Teams -- Configuring Group Policy Objects -- Assessing Network Readiness and Connectivity -- Summary -- Further Reading -- Exam Readiness Drill - Chapter Review Questions -- Chapter 2: Managing Security and Compliance Settings for Microsoft Teams -- Technical Requirements -- Identifying Licensing Requirements for Security and Compliance Features -- Retention Policies for Teams Chats and Channel Messages -- Sensitivity Labeling for Groups and Teams -- DLP for Teams -- IBs in Microsoft Teams -- Specifying Security and Compliance Alert Policies for Teams -- Alert Policies in Microsoft Defender -- Exercise 2.1: Creating Alert Policy -- Exercise 2.2: Creating Activity Alerts in Microsoft Defender -- Choosing Appropriate Teams Administrator Roles -- Assigning Teams Admin Roles to Users -- Exercise 2.3: Using the Azure Portal -- Exercise 2.4: Using Windows PowerShell -- Planning and Configuring Enhanced Encryption Policies -- Planning for E2EE -- Configuring Enhanced Encryption…”
    Libro electrónico
  15. 975
    Publicado 2023
    Tabla de Contenidos: “…Amazon ElastiCache for Redis -- Amazon ElastiCache for Memcached -- Choosing Between Redis and Memcached -- Amazon MemoryDB for Redis -- Time-Series Databases -- Amazon Timestream -- .NET and Amazon Timestream -- Ledger Databases -- Amazon QLDB -- .NET and Amazon QLDB -- Graph Databases -- Amazon Neptune -- .NET and Amazon Neptune -- Summary -- Part IV: Moving Existing Apps to AWS -- Chapter 12: Moving to Virtual Machines -- Virtual Machine Services on AWS -- Introducing AWS Elastic Beanstalk -- Elastic Beanstalk and .NET -- Packaging Applications for Deployment -- Deploying ASP.NET Applications -- Deploying ASP.NET Core Applications -- Using Publish to AWS to Deploy to Elastic Beanstalk -- Customizing the Virtual Machines -- Using .ebextension Scripts -- Using a Custom Launch Image -- Deploying to Elastic Beanstalk from Azure DevOps -- A (Short) Word About HTTPS and Elastic Beanstalk -- Deploying to Amazon EC2 Instances -- Introducing AWS CodeDeploy -- Working with CodeDeploy -- Setting Up CodeDeploy Resources -- Building the Application Deployment Package -- Deploying the New Version -- Summary -- Chapter 13: Containerizing -- General Requirements -- Containers and Networking -- Amazon ECS -- Amazon EKS -- Containerizing a .NET Framework 4.x Application -- Using Visual Studio -- Adding Docker Support -- Deploying Your Windows Container to ECR -- Containerizing Manually -- Containerizing a .NET Core-Based Application -- Using Visual Studio -- Using JetBrains Rider -- Containerizing a Running Application -- What Is AWS App2Container? …”
    Libro electrónico
  16. 976
    Publicado 2023
    Tabla de Contenidos: “…-- Taming Windows Update -- Troubleshooting and Repairing Windows Update -- Rolling Back and Uninstalling Updates -- Managing Windows Update with PowerShell -- Resetting and Reinstalling Windows 11 -- System Image Backup -- Reset This PC -- Summary -- Chapter 10: User Account and File Troubleshooting -- Configuring User Accounts -- Troubleshooting an Azure AD Connection -- Managing Provisioning and Device Management -- Managing Local Accounts -- Managing User Groups and Accounts -- Managing User Groups -- Using the Select Users Dialog -- Managing User Accounts on the PC -- Managing Permissions for Disks, Folders, and Files -- Understanding Inheritance -- Understanding Ownership -- Managing Permissions Using Scripting -- Checking Effective Access for a Disk, Folder, or File -- Managing Object Sharing on a PC -- Summary…”
    Libro electrónico
  17. 977
    Publicado 2024
    Tabla de Contenidos: “…-- Defining relationships -- Adding the Country property to the City entity class -- Adding the Cities property to the Country entity class -- Defining the database table names -- Defining indexes -- Getting a SQL Server instance -- Installing SQL Server 2022 -- Installing the database management tool(s) -- Creating a SQL database on Azure -- SQL Database -- SQL Managed Instance -- SQL virtual machine -- Making a choice -- Setting up a SQL database -- Configuring the instance -- Configuring the database -- Creating the WorldCities database -- Adding the WorldCities login -- Mapping the login to the database -- Creating the database using Code-First -- Setting up the DbContext -- Entity type configuration methods -- Data annotations -- Fluent API -- EntityTypeConfiguration classes -- Making a choice -- Database initialization strategies -- Updating the appsettings.json file -- Securing the connection string -- Introducing Secrets Storage -- Adding the secrets.json file -- Working with the secrets.json file -- Creating the database -- Updating Program.cs -- Adding the initial migration -- Using the dotnet CLI -- Using the Package Manager Console -- Checking the autogenerated database tables -- Understanding migrations -- Populating the database -- Implement SeedController -- Import the Excel file -- Entity controllers -- CitiesController -- CountriesController -- Should we really use entities? …”
    Libro electrónico
  18. 978
    Publicado 2019
    “…Throughout the book, you will learn how to develop mobile apps using Xamarin, Xamarin.Forms and .NET Standard; implement a webbased backend composed of microservices with .NET Core using various Azure services including but not limited to Azure App Services, Azure Active Directory, Notification Hub, Logic Apps, and Azure Functions, Cognitive Services; create data stores using popular database technologies such as Cosmos DB, SQL and Realm. …”
    Libro
  19. 979
    Publicado 2022
    “…In addition, it demonstrates how powerful machine learning models using Azure, such as Azure Stream Analytics, Azure Databricks, and Azure Synapse Analytics, can be built. …”
    Libro electrónico
  20. 980
    Publicado 2017
    “…Focus on the expertise measured by these objectives: • Implement SQL in Azure • Manage databases and instances • Manage storage This Microsoft Exam Ref: • Organizes its coverage by exam objectives • Features strategic, what-if scenarios to challenge you • Assumes you have working knowledge of SQL Server administration and maintenance, as well as Azure skills Provisioning SQL Databases About the Exam Exam 70-765 focuses on skills and knowledge for provisioning, upgrading, and configuring SQL Server; managing databases and files; and provisioning, migrating, and managing databases in the Microsoft Azure cloud. …”
    Libro electrónico