Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
21821Publicado 2015“…As a consultant, he specializes in Linux High Availability solutions and Performance Optimization. More information about Sander is on his website at www.sandervanvugt.com . …”
-
21822Publicado 2015“…What You Will Learn Install and configure the Debian and CentOS systems Set up and configure file servers Administer networked nodes remotely Discover how to monitor system performance for peak health Configure network services such as DNS and DHCP Host HTTP content via Apache Troubleshoot Linux networking issues In Detail Linux is everywhere. …”
Libro electrónico -
21823Publicado 2015“…Then you will see how to use Node.js to connect to a MongoDB database and perform data manipulations. From here on, the book will take you through integration with third-party tools for interaction with web apps. …”
Libro electrónico -
21824Publicado 2017“…The book also shows you how you can manage, monitor, and scale your solution for optimal performance. By the end of this book, you will be well-versed in using Azure Stream Analytics to develop an efficient analytics solution that can work with any type of data. …”
Libro electrónico -
21825Publicado 2019“…The 37 video lessons are broken down into five domains and cover the following topics: Mobile Devices Networking Hardware Virtualization and Cloud Computing Hardware and Network Troubleshooting Topics include Domain 1: Mobile Devices Domain 2: Networking Domain 3: Hardware Domain 4: Virtualization and Cloud Computing Domain 5: Hardware and Network Troubleshooting Skill Level Beginner You Will Learn All the objectives in the CompTIA A+ Core 1 (220-1001) exam Test-taking techniques with interactive practice quizzes, performance-based simulations, and hands-on exercises How to build a computer, perform networking tasks, configure laptops and mobile devices, and perform troubleshooting tasks Real-world skills Who Should Take This Course The target audience for CompTIA A+ (Core 1) 220-1001 Complete Video Course is people looking to pass the CompTIA exam as well as those interested in entering the IT field, current computer technicians, help desk technicians, and LAN support specialists. …”
-
21826Publicado 2018“…What You Will Learn Learn Hadoop Ecosystem and Apache projects Understand, compare NoSQL database and essential software architecture Cloud infrastructure design considerations for big data Explore application scenario of big data tools for daily activities Learn to analyze and visualize results to uncover valuable insights Build and run a big data application with sample code from end to end Apply Machine Learning and AI to perform big data intelligence Practice the daily activities performed by big data architects In Detail The big data architects are the “masters” of data, and hold high value in today's market. …”
Libro electrónico -
21827Publicado 2019“…The book will then help you perform asynchronous programming in C# and diagnose and debug parallel code effectively. …”
Libro electrónico -
21828Publicado 2017“…What You Will Learn Use Ansible playbooks, roles, modules, and templating to build generic, testable playbooks Manage Linux and Windows hosts remotely in a repeatable and predictable manner See how to perform security patch management, and security hardening with scheduling and automation Set up AWS Lambda for a serverless automated defense Run continuous security scans against your hosts and automatically fix and harden the gaps Extend Ansible to write your custom modules and use them as part of your already existing security automation programs Perform automation security audit checks for applications using Ansible Manage secrets in Ansible using Ansible Vault In Detail Security automation is one of the most interesting skills to have nowadays. …”
Libro electrónico -
21829Publicado 2017“…You will also learn how to perform large-scale machine learning on Big Data using Apache Spark. …”
Libro electrónico -
21830Publicado 2022“…By the end of the course, you will be able to perform a MITM attack on the target network and fully control all the connected computers. …”
Video -
21831por Hunter, Laura E.“…The Active Directory Cookbook will help you: Perform Active Directory tasks from the command line Use scripting technologies to automate Active Directory tasks Manage new Active Directory features, such as Read-Only Domain Controllers, fine-grained password policies, and more Create domains and trusts Locate users whose passwords are about to expire Apply a security filter to group policy objects Check for potential replication problems Restrict hosts from performing LDAP queries View DNS server performance statistics Each recipe includes a discussion explaining how and why the solution works, so you can adapt the problem-solving techniques to similar situations. …”
Publicado 2009
Libro electrónico -
21832Publicado 2022“…By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies. …”
Libro electrónico -
21833Publicado 2017“…Get the most out of the popular Java libraries and tools to perform efficient data analysis About This Book Get your basics right for data analysis with Java and make sense of your data through effective visualizations. …”
Libro electrónico -
21834Publicado 2019“…The lessons cover building JVM and non-JVM applications, leveraging contract tests to drive the change of the API, as well as performing the provider and consumer-driven contract tests. …”
-
21835Publicado 2019“…By the end of this book, you’ll be well versed with key aspects of an Azure SQL database instance, such as migration, backup restorations, performance optimization, high availability, and disaster recovery. …”
Libro electrónico -
21836Publicado 2017“…Skill Level Beginner Learn How To Access the Cisco DevNet Sandbox Perform an Initial Config on a CUCM Server Register a Collaboration Endpoint Add Users and Phones Add Gateways and Trunks Create a Route Plan on CUCM Configure CUCM Features Who Should Take This Course The primary audience for this video are those network video and collaboration engineers pursuing the CCNA Collaboration certification. …”
-
21837Publicado 2017“…Garringer has a special interest in Wireshark and protocol analysis and has spent considerable time performing frame and packet analysis in customer and lab environments. …”
-
21838Publicado 2018“…You see, relational databases need high-performance hardware and disks to perform at the peak level. …”
-
21839Publicado 2023“…What you will learn Understand the tactics, techniques, and procedures of reconnaissance Grasp the importance of attack surface management for organizations Find out how to conceal your identity online as an ethical hacker Explore advanced open source intelligence (OSINT) techniques Perform active reconnaissance to discover live hosts and exposed ports Use automated tools to perform vulnerability assessments on systems Discover how to efficiently perform reconnaissance on web applications Implement open source threat detection and monitoring tools Who this book is for If you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. …”
Libro electrónico -
21840por Raghavendra, Sujay“…You'll learn essential aspects of Selenium testing in Java, including working with different browsers, locating web elements using locators, and performing actions on them. From there, you’ll explore how to handle dynamic web pages and effective wait mechanisms and verifications to ensure accurate and reliable test results. …”
Publicado 2024
Libro electrónico