Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- CD-ROM 601
- Historia 410
- Música 390
- Engineering & Applied Sciences 339
- Inglés (Lengua) 291
- Computer Science 245
- Grabaciones sonoras 234
- Development 209
- Estudio y enseñanza 185
- Examinations 171
- Música sagrada 163
- Society & social sciences 160
- Certification 143
- Música orquestal 142
- Operating systems (Computers) 141
- Application software 138
- Estudio y enseñanza (Primaria) 125
- Empresas 124
- Ejercicios 121
- Lengua inglesa 121
- Computer software 120
- Electronic data processing personnel 119
- Música vocal 118
- Llibres de text 112
- Ensenyament 105
- Inglés comercial 105
- Cloud computing 103
- Computer networks 101
- Música instrumental 98
- Arte 97
-
12661Publicado 2023“…You'll learn how to automate the deployment of Terraform configuration with continuous integration and continuous delivery (CI/CD). Besides that, several new chapters have been added that describe the use of Terraform for Docker and Kubernetes, examine advanced topics on GitOps practices, and explain how to test Terraform configurations using different tools to check code and security compliance. …”
Libro electrónico -
12662Publicado 2008Tabla de Contenidos: “…Quizzes -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Appendix B: Decimal to Binary Conversion Table -- Appendix C: ICND1 Exam Updates: Version 1.0 -- Glossary -- Part VII: CD-only -- Appendix D: Subnetting Practice -- Appendix E: Subnetting Reference Pages -- Appendix F: Additional Scenarios -- Appendix G: Subnetting Video Reference -- Appendix H: Memory Tables -- Appendix I: Memory Tables Answer Key -- Appendix J: ICND1 Open-Ended Questions…”
Libro electrónico -
12663Publicado 2008Tabla de Contenidos: “…Quizzes -- Chapter 1 -- Chapter 2 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Appendix B: Decimal to Binary Conversion Table -- Appendix C: ICND2 Exam Updates: Version 1.0 -- Glossary -- Part VIII: CD-Only -- Appendix D: Subnetting Practice -- Appendix E: Subnetting Reference Pages -- Appendix F: Additional Scenarios -- Appendix G: Video Scenario Reference -- Appendix H: ICND1 Chapter 12: IP Addressing and Subnetting -- Appendix I: ICND1 Chapter 17: WAN Configuration -- Appendix J: Memory Tables…”
Libro electrónico -
12664por Erickson, Jon, 1977-“…Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits…”
Publicado 2008
Libro electrónico -
12665Publicado 2012Tabla de Contenidos: “…Chapter 12 Security Administration and Planning -- Understanding Security Policies -- Security Policy Characteristics -- Enforcing Security Policies -- Value of a Security Policy -- Understanding Code of Ethics -- Policy Awareness -- Updating Security Policies -- Understanding Business Continuity Plans -- Business Impact Analysis -- Disaster Recovery Plan -- Comparing a BCP and a DRP -- Alternate Locations -- Identifying Security Organizations -- NIST -- US-CERT -- CERT/CC -- Questions -- Answers -- Chapter 13 Legal Issues -- Exploring Computer Forensics -- First Responders and Preserving the Scene -- Three Phases of a Computer Forensics Investigation -- Forensic Evidence Guiding Principles -- Volatile Data -- Comparing Computer Abuse and Computer Crime -- Understanding Fraud and Embezzlement Crime -- Mandatory Vacations -- Job Rotation -- Understanding Privacy Issues -- European Directives -- California Supreme Court Rules That Zip Codes Are PII -- Connecticut's Public Act No. 08-167 -- Children's Online Privacy Protection -- California Online Privacy Protection Act of 2003 -- Questions -- Answers -- Chapter 14 Cryptography -- An Overview of Cryptography Concepts -- Enforcing Integrity with Hashing -- Hashing Algorithms Provide One-Way Encryption -- Hashing Algorithms -- Verifying a Hash -- Exploring Symmetric Encryption -- ROT13 -- Comparing Block and Stream Ciphers -- Advanced Encryption Standard -- Other Symmetric Encryption Algorithms -- Exploring Asymmetric Encryption -- Secure Sockets Layer -- Protecting E-mail with S/MIME -- Other Encryption Schemes -- Steganography -- IPsec -- Public Key Infrastructure -- Certificates -- Certification Authority -- Comparing Cryptanalysis Attacks -- Known Plaintext Attack -- Cipher Text Attack -- Questions -- Answers -- Appendix: About the CD -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K.…”
Libro electrónico -
12666por Lucas, Michael, 1967-Tabla de Contenidos: “…Vnodes -- Common Foreign Filesystems -- MS-DOS -- NTFS -- ext2fs -- CD -- Foreign Filesystem Ownership -- Removable Media -- Mounting Filesystem Images -- Attaching Vnode Devices to Disk Images -- Detaching Vnode Devices from Images -- Basic NFS Setup -- The OpenBSD NFS Server -- Exporting Filesystems -- Read-Only Mounts -- NFS and Users -- Permitted Clients -- Multiple Exports for One Partition -- NFS Clients -- Software RAID -- RAID Types -- Preparing Disks for softraid -- Creating softraid Devices -- softraid Status -- Identifying Failed softraid Volumes -- Rebuilding Failed softraid Volumes -- Deleting softraid Devices -- Reusing softraid Disks -- Booting from a softraid Device -- Encrypted Disk Partitions -- Creating Encrypted Partitions -- Using Encrypted Partitions -- Automatic Decryption -- 10. …”
Publicado 2013
Libro electrónico -
12667Publicado 2023Tabla de Contenidos: “…Prediction -- Experiment -- Analysis -- Understanding the most common statistical methods -- Percentages -- Mean, average, and standard deviation -- Quantiles and percentiles -- Histograms -- Using other mathematical models in observability -- Visualizing histograms with Grafana -- In practice - applying what you've learned -- Lab architecture -- Lab contents -- Lab instructions -- Summary -- Further reading -- Part 3 - Applying Architecture for Reliability -- Chapter 8: Reliable Architecture - Systems Strategy and Design -- Technical requirements -- Designing for reliability -- Architectural aspects -- Reliability equations -- Design patterns -- Modern applications -- Splitting and balancing the workload -- Splitting -- Balancing -- Failing over - almost as good -- Scaling up and out - horizontal versus vertical -- Horizontal -- Vertical -- Autoscaling -- In practice - applying what you've learned -- Lab architecture -- Lab contents -- Lab instructions -- Summary -- Further reading -- Chapter 9: Valued Automation - Toil Discovery and Elimination -- Technical requirements -- Eliminating toil -- Toil redefined -- Why toil is bad -- Handling toil the right way -- Treating automation as a software problem -- Document -- Algorithm -- Code -- Automating the (in)famous CI/CD pipeline -- Continuous integration -- Continuous delivery -- Production releases -- In practice - applying what you've learned -- Lab architecture -- Lab contents -- Lab instructions -- Summary -- Further reading -- Chapter 10: Exposing Pipelines - GitOps and Testing Essentials -- A basic pipeline - building automation to deploy infrastructure as code architecture and code -- Pipelines in chronological order -- Pipeline templates -- Errors or breaks in pipelines -- Using containers in pipelines -- Pipeline artifacts -- Pipeline troubleshooting tips…”
Libro electrónico -
12668Publicado 2024Tabla de Contenidos: “…Turn APIs inside out by treating events as contracts -- Invert responsibility for invocation -- Connect services through an event hub -- Dividing a system into autonomous subsystems -- By actor -- By business unit -- By business capability -- By data life cycle -- By legacy system -- Creating subsystem bulkheads -- Separate cloud accounts -- External domain events -- Dissecting an autonomous subsystem -- Context diagram -- Micro frontend -- Event hub -- Autonomous service patterns -- Backend For Frontend -- External Service Gateways -- Control services -- Dissecting an autonomous service -- Repository -- CI/CD pipeline and GitOps -- Tests -- Stack -- Persistence -- Trilateral API -- Events -- API Gateway -- Functions -- Nano architecture -- Micro architecture -- Shared libraries -- Governing without impeding -- Providing automation and cross-cutting concerns -- Promoting a culture of robustness -- Harnessing the four key team metrics -- Summary -- Chapter 3: Taming the Presentation Tier -- Presentation tier innovation - zigzagging through time -- Client-side versus server-side rendering -- Build-time versus runtime rendering -- Web versus mobile -- Breaking up the frontend monolith -- By subsystem -- By user activity -- By device type -- By version -- Dissecting micro frontends -- The main app -- The index file -- The importmap file -- Micro-app registration -- Micro-app -- The entry file -- Root component -- Micro-app activation -- Micro-app life cycle -- Route-based activation -- Manual activation -- Mount points -- Manifest deployer -- Inter-application communication -- Designing for offline-first -- Transparency -- Status indicators -- Outbox -- Inbox -- Local cache -- Caching code -- Caching data reads -- Caching data writes -- Live updates -- WebSocket -- Long polling -- Summary -- Chapter 4: Trusting Facts and Eventual Consistency…”
Libro electrónico -
12669Publicado 2024Tabla de Contenidos: “…-- Before the cloud -- The cloud comes into play -- A paradigm shift -- Hidden on-premises costs -- Back to the present -- The FinOps Foundation -- The three pillars of FinOps -- Inform -- Example (the Inform pillar) -- Optimize -- Example (the Optimize pillar) -- Operate -- Example (the Operate pillar) -- Summary -- Chapter 2: Understanding How FinOps Fits into Cloud Governance -- The Well-Architected Framework - an introduction -- FinOps as part of bigger governance -- FinOps + Agile methodologies -- FinOps, Infrastructure as Code, CI/CD, and DevOps -- FinOps and change management -- Tailoring a FinOps approach for each organization -- Scenario 1 - companies not yet in the cloud or beginning their journey to it -- Scenario 2 - companies already in the cloud but not mature enough or that have non-optimized workloads -- Scenario 3 - big companies with strong cloud maturity -- Scenario 4 - companies focused on generating cloud cost savings -- Selecting the right tools for the job -- Base tools -- Market tools -- Other interesting tools -- Summary -- Part 2: Inform - How to Increase Cost Visibility -- Chapter 3: Designing and Executing the Tagging and Naming Convention Strategies -- The importance of naming conventions and tagging in FinOps -- Why are naming conventions significant? …”
Libro electrónico -
12670por Dhanasekaran, Chandra MohanTabla de Contenidos: “…-- Scenario -- Basic Concepts of IaC -- Declarative Approach versus Imperative Approach -- Version Control -- Idempotency -- Infrastructure Provisioning and Configuration Management -- IaC Tools in the Market -- How to Choose the Right IaC Tool -- HashiCorp Terraform -- Progress Chef -- Creating Your First Recipe -- Puppet -- Pulumi -- AWS CloudFormation -- IaC Use Cases -- Multi-Cloud Deployments -- Application Deployments, Scaling, and Monitoring Tools -- Policy Compliance and Management -- Testing Environments and Software Demos -- Benefits of IaC -- Rapid Deployments and Tool Integration -- Lower Costs and Error Reduction -- Configuration Drift Elimination -- Improved Infrastructure Consistency -- DevOps and CI/CD -- Don't Repeat Yourself (DRY) -- Creating a Simple AWS DynamoDB Table Using a CloudFormation Template -- Creating an AWS S3 Bucket Using Terraform -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 2: Why Do We Need Terraform? …”
Publicado 2024
Libro electrónico -
12671por Kasper, Walter, 1933-
Publicado 2013Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Red de bibliotecas Iglesia Navarra, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca de Pastoral Madrid, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Biblioteca Diocesana Bilbao, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
12672Publicado 2021Tabla de Contenidos: “…-- 8.9 Automated testing in the CD pipeline -- 8.10 Review of testing -- 8.11 Continue your learning -- Summary -- 9 Exploring FlixTube -- 9.1 No new tools! …”
Libro electrónico -
12673Publicado 2017Tabla de Contenidos: “…-- The Art (and Craft) of Restoration -- Restoring Tone -- Restoring Color -- Fine-Detail Repairs and Cleanup -- Major Damage Repairs -- Repairing Uneven Damage -- Fooling Around -- A Modest Taxonomy of Restoration -- Prints -- Slides -- Negatives -- Newspaper Clippings -- Take Your Time -- Chapter 2: Hardware for Restoration -- The "Bottom" Line -- The Computer -- Memory -- Hard Drives -- Display -- Laptops and iMacs -- Graphics Tablets -- Color Management and ColorMunki -- Backup and Long-Term Storage -- Scanners -- Printers -- Chapter 3: Software for Restoration -- Image Processing Programs -- Photoshop CC and CS6 -- Maximizing Photoshop Performance -- Avoiding Photoshop -- Alternatives to Photoshop -- Photoshop Elements 14 -- Elements XXL -- Affinity Photo -- Photoline 19 -- Plug-in and Stand-Alone Tools -- AKVIS Retoucher -- Polaroid Dust & -- Scratch Removel -- Focus Magic -- Noise Ninja/Photo Ninja -- Topaz Labs DeNoise 6 -- Topaz Labs InFocus -- Topaz Labs Detail 3 -- Topaz Labs Clarity -- Repair and Recover Tools -- CD/DVD Diagnostic -- JPEG Recovery Pro 5.0 -- Stellar Phoenix JPEG Repair -- RS File Repair -- Picture Doctor 2 -- Chapter 4: Getting the Photo into the Computer -- How-Tos in This Chapter…”
Libro electrónico -
12674Publicado 2025Tabla de Contenidos: “…-- Discover the Types of Game Delivery -- Explore the Various Gaming Genres -- Understand How Game Makers Get Paid -- A Few of My Favorites -- Chapter 15 Viewing and Creating Digital Photos and Videos -- Stream TV and Movies from the Internet -- Explore YouTube Content -- Take a Picture of Yourself -- Record a Video of Yourself -- Transfer Photos and Videos from a Camera or Phone -- View and Edit Photos in the Photos App -- Create a Video with Clipchamp -- Chapter 16 Listening to Music on Your PC -- Preparing to Listen to Digital Music -- Introducing Media Player -- Make Your Stored Music Available in Media Player -- Play Music -- Create a Playlist -- Rip a Music CD -- Acquire New Music -- Part 5 Windows Toolkit -- Chapter 17 Working with Networks -- Plan and Set Up a Home Network -- Enable Wireless Router Security -- Set Up File Sharing on Your PC -- Choose What Folders to Share -- Share a Local Printer…”
Libro electrónico -
12675por Ballew, JoliTabla de Contenidos: “…Contents note continued: Reading app reviews -- Installing free apps -- Viewing your apps in the Windows Store -- Buying an app -- Rating and reviewing an app -- Configuring Windows Store preferences -- Navigating the Music app -- Listening to music -- Searching for music -- Creating a playlist in the Music app -- Listening to radio -- Finding music to purchase by browsing -- Finding music to purchase by searching -- Buying music -- Configuring music in the cloud -- Playing music with Windows Media Player -- Sorting and viewing music -- Creating playlists -- Ripping music you own -- Burning music to a CD -- Displaying pictures -- Searching for pictures -- Creating folders for your pictures -- Moving pictures to new folders -- Setting a picture on the Photos tile or lock screen -- Cropping a picture -- Editing a picture -- Playing a slide show -- Exploring the Video app -- Playing a personal video -- Buying or renting a video -- Using the camera --…”
Publicado 2013
Libro electrónico -
12676Publicado 2024Tabla de Contenidos: “…Chapter 14: Application Integration: Combination -- Combining two applications into one -- Combining many applications using the Command design pattern -- Managing arguments and configuration in composite applications -- Wrapping and combining CLI applications -- Wrapping a program and checking the output -- Chapter 15: Testing -- Using docstrings for testing -- Testing functions that raise exceptions -- Handling common doctest issues -- Unit testing with the unittest module -- Combining unittest and doctest tests -- Unit testing with the pytest module -- Combining pytest and doctest tests -- Testing things that involve dates or times -- Testing things that involve randomness -- Mocking external resources -- Chapter 16: Dependencies and Virtual Environments -- Creating environments using the built-in venv -- Installing packages with a requirements.txt file -- Creating a pyproject.toml file -- Using pip-tools to manage the requirements.txt file -- Using Anaconda and the conda tool -- Using the poetry tool -- Coping with changes in dependencies -- Chapter 17: Documentation and Style -- The bare minimum: a README.rst file -- Installing Sphinx and creating documentation -- Using Sphinx autodoc to create the API reference -- Identifying other CI/CD tools in pyproject.toml -- Using tox to run comprehensive quality checks -- Other Books You May Enjoy -- Packt Page -- Index -- Blank Page…”
Libro electrónico -
12677
-
12678
-
12679
-
12680