Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 8
- Application software 7
- Linux 7
- Operating systems (Computers) 7
- Application program interfaces (Computer software) 6
- Cloud computing 5
- Engineering & Applied Sciences 5
- Open source software 5
- Programming 5
- Web site development 5
- Computer software 4
- Database management 4
- Internet programming 4
- Mathematics 4
- Web sites 4
- Computer programming 3
- Design 3
- Educació 3
- Electrical & Computer Engineering 3
- Java (Computer program language) 3
- PHP (Computer program language) 3
- Security measures 3
- Agriculture and Food 2
- Calculus 2
- Computer Science 2
- Computer animation 2
- Computer network architectures 2
- Computer networks 2
- Computer programs 2
- Electromagnetism 2
-
81por Ulaby, FawwazTabla de Contenidos: “…Vector Analysis -- 3-1 Basic Laws of Vector Algebra -- 3-2 Orthogonal Coordinate Systems -- 3-3 Transformations between Coordinate Systems -- 3-4 Gradient of a Scalar Field -- TB5 Global Positioning System -- 3-5 Divergence of a Vector Field -- 3-6 Curl of a Vector Field -- TB6 X-Ray Computed Tomography -- 3-7 Laplacian Operator -- Chapter 4. …”
Publicado 2022
Libro electrónico -
82por Paul, Clayton R.Tabla de Contenidos: “…-- 7.7 Modeling Vias on PCBs -- 7.8 Modeling Pins in Connectors -- 7.9 Net Self Inductance of Wires in Parallel and in Series -- 7.10 Computation of Loop Inductances for Various Loop Shapes -- 7.11 Final Example: Use of Loop and Partial Inductance to Solve a Problem -- Appendix A: Fundamental Concepts of Vectors -- A.1 Vectors and Coordinate Systems -- A.2 Line Integral -- A.3 Surface Integral -- A.4 Divergence -- A.4.1 Divergence Theorem -- A.5 Curl -- A.5.1 Stokes's Theorem -- A.6 Gradient of a Scalar Field -- A.7 Important Vector Identities -- A.8 Cylindrical Coordinate System -- A.9 Spherical Coordinate System -- Table of Identities, Derivatives, and Integrals Used in this Book -- References and Further Readings -- Index…”
Publicado 2010
Libro electrónico -
83Publicado 2016Tabla de Contenidos: “…Chapter 10: Data IO in Go -- IO with readers and writers -- The io.Reader interface -- Chaining readers -- The io.Writer interface -- Working with the io package -- Working with files -- Creating and opening files -- Function os.OpenFile -- Files writing and reading -- Standard input, output, and error -- Formatted IO with fmt -- Printing to io.Writer interfaces -- Printing to standard output -- Reading from io.Reader -- Reading from standard input -- Buffered IO -- [Buffered writers and readers] -- Buffered writers and readers -- Scanning the buffer -- In-memory IO -- Encoding and decoding data -- Binary encoding with gob -- Encoding data as JSON -- Controlling JSON mapping with struct tags -- Custom encoding and decoding -- Summary -- Chapter 11: Writing Networked Services -- The net package -- Addressing -- The net.Conn Type -- Dialing a connection -- Listening for incoming connections -- Accepting client connections -- A TCP API server -- Connecting to the TCP server with telnet -- Connecting to the TCP server with Go -- The HTTP package -- The http.Client type -- Configuring the client -- Handling client requests and responses -- A simple HTTP server -- The default server -- Routing requests with http.ServeMux -- The default ServeMux -- A JSON API server -- Testing the API server with cURL -- An API server client in Go -- A JavaScript API server client -- Summary -- Chapter 12: Code Testing -- The Go test tool -- Test file names -- Test organization -- Writing Go tests -- The test functions -- Running the tests -- Filtering executed tests -- Test logging -- Reporting failure -- Skipping tests -- Table-driven tests -- HTTP testing -- Testing HTTP server code -- Testing HTTP client code -- Test coverage -- The cover tool -- Code benchmark -- Running the benchmark -- Skipping test functions -- The benchmark report -- Adjusting N.…”
Libro electrónico -
84Publicado 2024Tabla de Contenidos: “…Business logic vulnerabilities -- Preview of the Open Worldwide Application Security Project API Security Top 10 2023 -- Summary -- Further reading -- Chapter 4: Investigating Recent Breaches -- The importance of learning from mistakes -- Examining 10 high-profile API breaches from 2022 -- 1-Global shipping company -- 2-Campus access control -- 3-Microbrewery application -- 4-Cryptocurrency portal -- 5-Dating application -- 6-The All in One SEO WordPress plugin -- 7-X account information leakage -- 8-Home router -- 9-Remote access to two popular vehicles -- 10-Smart Scale -- Key takeaways and learning -- Summary -- Further reading -- Part 2: Attacking APIs -- Chapter 5: Foundations of Attacking APIs -- Technical requirements -- Understanding API attackers and their methods -- Interacting with APIs -- Finding API keys -- Enumeration and discovery of APIs -- Fuzzing API endpoints -- Attacking JWTs -- Mastering the tools of the trade -- CLI clients (HTTPie/cURL) -- Postman -- Browser tools -- Burp Suite -- Reverse proxies -- Learning the key skills of API attacking -- Building a laboratory -- Hacking vulnerable APIs -- Training courses -- Summary -- Further reading -- Chapter 6: Discovering APIs -- Technical requirements -- Passive discovery -- Google -- Offensive security Google database -- Other API-specific searchable databases -- Code analysis techniques -- Active discovery -- Network discovery and scan -- OWASP ZAP -- Burp Suite -- Reverse-engineering mobile apps -- Postman -- Implementation analysis -- Verbose error and debug messages -- OS and framework enumeration -- Timing or volume attacks -- Utilizing online tools such as BuiltWith or Wappalyzer -- Evading common defenses -- Summary -- Further reading -- Chapter 7: Attacking APIs -- Technical requirements -- Authentication attacks -- Insecure implementation logic…”
Libro electrónico -
85Publicado 2024Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Foreword -- Acknowledgment -- Contributors -- Preface -- Table of Contents -- Part 1: UX Foundation for Enterprise ChatGPT -- Chapter 1: Recognizing the Power of Design in ChatGPT -- Technical requirements -- Approach 1 - The no-code approach -- Approach 2 - code with Node.JS, Python, or curl -- Traversing the history of conversational AI -- The importance of UX design for ChatGPT -- Understanding the science and art of UX design -- The science of design -- The art of design -- It takes a village to create superb UX -- Setting up a customized model -- Summary -- References -- Chapter 2: User Research -- Surveying UX research methods -- Understanding user needs analysis -- Surveys for conversational AI -- Survey checklist -- Case study on an effective survey -- Designing insightful interviews -- Defining research objectives -- Selecting participants -- Develop a structured interview program -- Pilot the interview process and program -- Conduct the structured interviews -- Record and document findings -- Data analysis -- Report findings -- Summary of the interview process -- Getting started with conversational analysis -- Tagging a log file should focus on each interaction -- Define success and failure categories -- Trying conversational analysis -- Exploring the examples from the case study -- Generate enhancements and bugs from groups of issues -- Score results -- Results -- Summary -- References -- Chapter 3: Identifying Optimal Use Cases for ChatGPT -- Understanding use case basics -- Use case or user stories -- Establishing a baseline with ChatGPT -- Example use case for a ChatGPT instance - patching software -- Creating a user story from a use case -- Prioritizing ChatGPT opportunities from the use case -- Aligning LLMs with user goals -- Applications of ChatGPT…”
Libro electrónico -
86Publicado 2018Tabla de Contenidos: “….movingaverage() -- .trend() -- .range() -- .precision() -- Data source functions -- Elasticsearch -- Static/value -- World bank -- Setting the offset for data sources -- Saving Timelion graph -- Timelion sheet option -- Deleting Timelion sheet -- Timelion help -- Function reference -- Keyboard tips -- Timelion auto-refresh -- Summary -- Chapter 7: Interact with Your Data Using Dev Tools -- Console -- Copy as cURL -- Auto indent -- Multiple requests in console -- Profiling queries -- Query profile -- Aggregation profile -- Grok debugger -- Summary -- Chapter 8: Tweaking Your Configuration with Kibana Management -- Index pattern -- Creating the index pattern -- Setting the default index pattern -- Refreshing index pattern fields -- Deleting an index pattern -- Managing fields -- String -- Dates -- Geographic point field -- Numbers -- Saved objects -- Dashboards -- Searches -- Visualizations -- Advanced settings -- xPack:defaultAdminEmail -- search:queryLanguage -- search:queryLanguage:switcher:enable -- dateFormat -- dateFormat:tz -- dateFormat:dow -- defaultIndex -- Reporting -- Security -- Roles -- Users -- Watcher -- Creating the watch -- Threshold alert -- Advanced watch -- Deleting the watch -- Summary -- Chapter 9: Understanding X-Pack Features -- Installing X-Pack -- Installing X-Pack into Elasticsearch -- Installing X-Pack into Kibana -- Features of X-Pack -- Monitoring -- Elasticsearch monitoring -- Kibana monitoring -- Security settings -- Users -- Roles -- Machine learning -- Other options of X-Pack -- Application Performance Monitoring -- Logging -- Apache logs -- MySQL logs -- Nginx logs -- System logs -- Metrics -- Apache metrics -- Docker metrics -- Kubernetes metrics -- MySQL metrics -- Nginx metrics -- Redis metrics -- System metrics -- Summary -- Chapter 10: Machine Learning with Kibana -- Machine learning jobs -- Single metric Jobs…”
Libro electrónico -
87Publicado 2017Tabla de Contenidos: “…Generating a Report and Deleting the Site -- Running the Automation -- Conclusion -- Chapter 7: Automating OpenVAS -- Installing OpenVAS -- Building the Classes -- The OpenVASSession Class -- Authenticating with the OpenVAS Server -- Creating a Method to Execute OpenVAS Commands -- Reading the Server Message -- Setting Up the TCP Stream to Send and Receive Commands -- Certificate Validation and Garbage Collection -- Getting the OpenVAS Version -- The OpenVASManager Class -- Getting Scan Configurations and Creating Targets -- Wrapping Up the Automation -- Running the Automation -- Conclusion -- Chapter 8: Automating Cuckoo Sandbox -- Setting Up Cuckoo Sandbox -- Manually Running the Cuckoo Sandbox API -- Starting the API -- Checking Cuckoo's Status -- Creating the CuckooSession Class -- Writing the ExecuteCommand() Methods to Handle HTTP Requests -- Creating Multipart HTTP Data with the GetMultipartFormData() Method -- Processing File Data with the FileParameter Class -- Testing the CuckooSession and Supporting Classes -- Writing the CuckooManager Class -- Writing the CreateTask() Method -- The Task Details and Reporting Methods -- Creating the Task Abstract Class -- Sorting and Creating Different Class Types -- Putting It Together -- Testing the Application -- Conclusion -- Chapter 9: Automating Sqlmap -- Running sqlmap -- The sqlmap REST API -- Testing the sqlmap API with curl -- Creating a Session for sqlmap -- Creating a Method to Execute a GET Request -- Executing a POST Request -- Testing the Session Class -- The SqlmapManager Class -- Listing sqlmap Options -- Making a Method to Perform Scans -- The New Main() Method -- Reporting on a Scan -- Automating a Full sqlmap Scan -- Integrating sqlmap with the SOAP Fuzzer -- Adding sqlmap GET Request Support to the SOAP Fuzzer -- Adding sqlmap POST Request Support -- Calling the New Methods…”
Libro electrónico -
88Publicado 2003Tabla de Contenidos: “…Tools in the Toolbox -- 6.1 Toolbox tools -- 6.2 Networking and e-mail tools -- 6.2.1 ethereal -- 6.2.2 rsync -- 6.2.3 ftpcopy -- 6.2.4 ncftp -- 6.2.5 wget -- 6.2.6 rdist -- 6.2.7 lynx -- 6.2.8 curl -- 6.2.9 elm -- 6.2.10 fetchmail -- 6.2.11 mutt -- 6.2.12 proftpd -- 6.2.13 pine -- 6.2.14 wu-ftpd -- 6.3 File handling tools -- 6.3.1 zip -- 6.3.2 unzip -- 6.3.3 gzip/gunzip -- 6.3.4 bzip2/bunzip2 -- 6.3.5 zoo -- 6.3.6 lsof -- 6.3.7 less -- 6.3.8 findutils -- 6.3.9 fileutils -- 6.3.10 diffutils -- 6.3.11 hexedit -- 6.3.12 sh-utils -- 6.4 Development tools -- 6.4.1 libtool -- 6.4.2 autoconf/automake -- 6.4.3 rcs -- 6.4.4 patch -- 6.4.5 gcc -- 6.4.6 gdb -- 6.4.7 binutils -- 6.4.8 m4 -- 6.4.9 gmake -- 6.4.10 cvs -- 6.4.11 info -- 6.5 Miscellaneous tools -- 6.5.1 webmin -- 6.5.2 samba -- 6.5.3 vnc -- 6.5.4 php -- 6.5.5 sudo -- 6.6 Login shells -- 6.6.1 AIX shells -- 6.6.2 Toolbox shells -- 6.6.3 bash -- 6.6.4 tcsh -- 6.6.5 zsh -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
Libro electrónico -
89Publicado 2006Tabla de Contenidos: “…The del or nabla (∇) operator -- Gradient -- Divergence -- Curl -- Composite operations -- Second order differential operators -- Integral Operations on Field Functions -- Green's theorem in the plane -- Gauss's divergence theorem -- Green's identities (theorem) -- Stokes's theorem -- Line integral -- Surface and volume integrals -- Closure -- Exercises -- Chapter 19: Polynomial Equations -- Basic Principles -- Analytical Solution -- Cubic equations (Cardano) -- Quartic equations (Ferrari) -- General Polynomial Equations -- Two Simultaneous Equations -- Elimination Methods* -- Sylvester's dialytic method -- Bezout's method -- Advanced Techniques* -- Exercises -- Chapter 20: Solution of Nonlinear Equations and Systems -- Methods for Nonlinear Equations -- Bracketing and bisection -- Fixed point iteration -- Newton-Raphson method -- Secant method and method of false position -- Quadratic interpolation method -- Van Wijngaarden-Dekker Brent method -- Systems of Nonlinear Equations -- Newton's method for systems of equations -- Broyden's secant method -- Closure -- Exercises -- Chapter 21: Optimization: Introduction -- The Methodology of Optimization -- Single-Variable Optimization -- Optimality criteria -- Iterative methods -- Conceptual Background of Multivariate Optimization -- Optimality criteria -- Convexity -- Trust region and line search strategies -- Global and local convergence -- Exercises -- Chapter 22: Multivariate Optimization -- Direct Methods -- Cyclic coordinate search -- Rosenbrock's method -- Hooke-Jeeves pattern search -- Box's complex method -- Nelder and Mead's simplex search -- Remarks -- Steepest Descent (Cauchy) Method -- Newton's Method -- Modified Newton's method -- Hybrid (Levenberg-Marquardt) Method -- Least Square Problems -- Exercises -- Chapter 23: Methods of Nonlinear Optimization* -- Conjugate Direction Methods…”
Libro electrónico -
90Publicado 2018Tabla de Contenidos: “…-- Reactive support in Spring 5 -- Reactive in Spring MVC -- Spring WebFlux -- HandlerFunction -- RouterFunction -- Spring WebFlux server support -- Reactive WebClient -- Reactive WebTestClient -- Reactive WebSocket -- Spring WebFlux authentication architecture -- Spring WebFlux authorization -- Sample project -- WebFlux project setup -- Maven setup -- Configuration class -- The SpringWebFluxConfig class -- Repository -- Handler and router -- Bootstrap application -- Running the application -- Adding security -- Configuration classes -- The UserDetailsService bean -- The SpringSecurityFilterChain bean -- Running the application -- CURL -- Browser -- WebClient -- Maven setup -- Creating a WebClient instance -- Handling errors -- Sending requests and retrieving responses…”
Libro electrónico -
91Publicado 2018Tabla de Contenidos: “…. -- Chapter 11: Making the Scraper as a Service Real -- Introduction -- Creating and configuring an Elastic Cloud trial account -- How to do it -- Accessing the Elastic Cloud cluster with curl -- How to do it -- Connecting to the Elastic Cloud cluster with Python -- Getting ready -- How to do it -- There's more... -- Performing an Elasticsearch query with the Python API -- Getting ready -- How to do it -- There's more... -- Using Elasticsearch to query for jobs with specific skills -- Getting ready -- How to do it -- Modifying the API to search for jobs by skill -- How to do it -- How it works -- There's more... -- Storing configuration in the environment -- How to do it -- Creating an AWS IAM user and a key pair for ECS -- Getting ready -- How to do it -- Configuring Docker to authenticate with ECR -- Getting ready -- How to do it -- Pushing containers into ECR -- Getting ready -- How to do it -- Creating an ECS cluster -- How to do it…”
Libro electrónico -
92Publicado 2018Tabla de Contenidos: “…Import orderer settings at member organizations -- Setting up a private channel -- Create a new channel as the founder -- Adding member peers to the channel -- Summary -- Chapter 12: Designing and Developing Your First Smart Contract -- The proposed application -- Model-first design approach -- Designing the participants and base assets -- Designing the accident assets and transactions -- Designing the repair assets and transactions -- Designing the insurance assets and transactions -- Setting up the necessary development tools -- Installing cURL -- Installing Docker and Docker Compose -- Installing the Go programming language -- Step 1 - Installing Go -- Step 2 - Setting environment paths -- Step 3 - Setting up your Go workspace -- Downloading platform-specific binaries -- Installing Visual Studio Code (IDE) -- Programming the smart contract -- Setting up a workspace in VSCode -- Installing missing Go packages and commands -- Programming the actual chaincode -- Programming the initial chaincode skeleton -- Adding the data model objects -- Programming the ReportAccident transaction -- Summary -- Chapter 13: Deploying and Testing Your First Smart Contract -- Deploying your smart contract -- Installing chaincode on the founder's peers -- Activating the chaincode on a channel -- Installing a new version of our chaincode -- Installing chaincode on member organizations -- Exposing smart contracts using the REST proxy -- Exposing chaincode using the Advanced method -- Exposing chaincode using the Quick method -- Testing a smart contract using a REST client -- Installing a client to call the REST proxy's API -- Importing and testing chaincode API requests -- Available REST proxy APIs -- Getting the version of the OBCS API -- Overview of chaincode interactions -- Setting up all of the required demo assets -- Reading asset data to check the current values…”
Libro electrónico -
93Publicado 2016Tabla de Contenidos: “…Using tags to add metadata to structs -- Many operations with a single handler -- Reading polls -- Creating a poll -- Deleting a poll -- CORS support -- Testing our API using curl -- A web client that consumes the API -- Index page showing a list of polls -- Creating a new poll -- Showing the details of a poll -- Running the solution -- Summary -- Chapter 7: Random Recommendations Web Service -- The project overview -- Project design specifics -- Representing data in code -- Public views of Go structs -- Generating random recommendations -- The Google Places API key -- Enumerators in Go -- Test-driven enumerator -- Querying the Google Places API -- Building recommendations -- Handlers that use query parameters -- CORS -- Testing our API -- Web application -- Summary -- Chapter 8: Filesystem Backup -- Solution design -- The project structure -- The backup package -- Considering obvious interfaces first -- Testing interfaces by implementing them -- Has the filesystem changed? …”
Libro electrónico -
94Publicado 2018Tabla de Contenidos: “…Using the Neutron command-line interface -- Using the OpenStack Python SDK -- Using the cURL utility -- Summary -- Virtual Network Infrastructure Using Linux Bridges -- Using the Linux bridge driver -- Visualizing traffic flow through Linux bridges -- VLAN -- Flat -- VXLAN -- Potential issues when using overlay networks -- Local -- Configuring the ML2 networking plugin -- Configuring the bridge interface -- Configuring the overlay interface -- ML2 plugin configuration options -- Type drivers -- Mechanism drivers -- Using the L2 population driver -- Tenant network types -- Flat networks -- Network VLAN ranges -- VNI ranges -- Security groups -- Configuring the Linux bridge driver and agent -- Installing the Linux bridge agent -- Updating the Linux bridge agent configuration file -- Physical interface mappings -- Enabling VXLAN -- L2 population -- Local IP -- Firewall driver -- Configuring the DHCP agent to use the Linux bridge driver -- Restarting services -- Verifying Linux bridge agents -- Summary -- Building a Virtual Switching Infrastructure Using Open vSwitch -- Using the Open vSwitch driver -- Basic OpenvSwitch commands -- Base commands -- ovs-vsctl -- ovs-ofctl -- ovs-dpctl -- ovs-appctl -- Visualizing traffic flow when using Open vSwitch -- Identifying ports on the virtual switch -- Identifying the local VLANs associated with ports -- Programming flow rules -- Flow rules for VLAN networks -- Return traffic -- Flow rules for flat networks -- Flow rules for overlay networks -- Flow rules for local networks -- Configuring the ML2 networking plugin -- Configuring the bridge interface -- Configuring the overlay interface -- ML2 plugin configuration options -- Mechanism drivers -- Flat networks -- Network VLAN ranges -- Tunnel ID ranges -- VNI Ranges -- Security groups -- Configuring the Open vSwitch driver and agent…”
Libro electrónico -
95por Hébert, Fred, 1988-Tabla de Contenidos: “…*pumps shotgun* -- Generic Event Handlers -- The init and terminate Functions -- The handle_event Function -- The handle_call Function -- The handle_info Function -- The code_change Function -- It's Curling Time! -- The Scoreboard -- Game Events -- Alert the Press! …”
Publicado 2013
Libro electrónico -
96Publicado 2024Tabla de Contenidos: “…Chapter 3: Integrating Application Protocols -- Technical requirements -- Installing Mosquitto -- Installing Client for URL (cURL) -- Application protocols and they fit into the picture -- The different types of application protocols -- An exercise to create a pub/sub MQTT broker -- Requirements for application protocols -- Reliability -- Power usage -- Security -- Integrating application protocols into the design -- A simple integration into the smart thermostat network -- A cloud scenario -- Multiple clients -- Practical - creating an MQTT pub and sub communication between an ESP32 and a Raspberry Pi -- Setting up Mosquitto as the broker on Raspberry Pi -- Subscribing and publishing from MQTTX -- Summary -- Further reading -- Chapter 4: Examining Communication and Connectivity Technologies -- Technical requirements -- The role of short- and long-range protocols within IoT -- Design factors -- Long-range communication protocols -- Allocating resources -- Infrastructure protocols -- Mesh networking, RFID, and Bluetooth -- RFID -- Mesh networking -- Bluetooth -- Examining edge cases for protocol selection and operation -- Understanding the fundamental rules of architecting for different areas -- A look at a water utility IoT network -- Practice forming more networks -- Practical scenario - working with multiple communication protocols with ESP32 -- Making the connections -- Summary -- Further reading -- Part 2: Developing and Optimizing IoT Systems for Smart Environments -- Chapter 5: Realizing Wireless Sensor Networks within Smart Spaces -- Technical requirements -- Choosing between different sensor technologies -- Classes of sensor networks -- Routing for WSNs -- Design considerations -- Architecting the hardware and software -- Managing APIs -- How they integrate within the system -- Types of APIs -- Evaluating WSNs -- Metrics…”
Libro electrónico -
97
-
98Publicado 2023Tabla de Contenidos: “…PBR Service Graph Deployment Verification -- PBR Contracts Programming -- Traffic Flow Between EPGs with PBR -- Symmetric PBR -- Summary -- Chapter 9: Integrating ACI with Virtualization and Container Platforms -- Virtualization platform Integration -- VMware Integration Overview -- Access Policies for ESXi Hosts -- To Use LLDP/CDP or Not to Use LLDP/CDP -- ACI VMM Domain -- vDS Uplink to ESXi Mapping -- VMM Domain to EPG Binding -- VM to Port Group Association -- Container Integration to ACI -- Kubernetes Platform Overview -- Kubernetes Control Plane Components -- Kubernetes Worker Node Components -- Kubernetes Networking Overview -- Preparing ACI and Kubernetes Integration -- Kubernetes Server Nodes Network configuration -- Kubernetes Installation -- ACI CNI Components -- Demo YELB Application with ACI L4-L7 Service Graph and EPG segmentation -- Summary -- Chapter 10: ACI Automation and Programmability -- ACI Programmability Introduction -- REST APIs -- REST HTTP Response Codes -- Data Encoding Formats -- XML -- JSON -- YAML -- ACI Object Model -- Managed Object Discovery Tools -- ACI Documentation -- APIC URL/Debug Info -- Save-As Feature -- Visore -- API Inspector -- APIC CLI -- ACI REST API -- URL and Body Format -- REST API Authentication -- Direct REST API Access -- Linux Command Line - cURL -- Postman -- Python Requests Library -- Cobra Software Development Kit -- Cobra SDK Installation -- Using Cobra SDK for Querying and Creating ACI Objects -- Automating ACI Using Ansible -- Ansible Component Architecture -- Playbook Structure -- Inventory File -- Ansible Variables -- Ansible Roles -- ACI Ansible Collection and Installation -- Practical Example 1 - Create and Query ACI Objects -- Practical Example 2 - CSV Based ACI Automation -- YAML Tenant Structure Definition -- BD and EPG Automation from CVS Data -- Automating ACI Using Terraform…”
Libro electrónico -
99
-
100