Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 13
- Development 13
- Routers (Computer networks) 5
- Certification 4
- Cloud computing 4
- Computer software 4
- Electronic data processing 4
- Electronic data processing personnel 4
- Engineering & Applied Sciences 4
- Examinations 4
- Python (Computer program language) 4
- Application program interfaces (Computer software) 3
- Electrical & Computer Engineering 3
- Message processing 3
- Telecommunication 3
- Telecommunications 3
- Business enterprises 2
- Computer networks 2
- Computer programs 2
- Computing Technology Industry Association 2
- Data mining 2
- Data processing 2
- Data structures (Computer science) 2
- Database management 2
- Distributed processing 2
- Information technology 2
- Management 2
- Microsoft .NET Framework 2
- Microsoft software 2
- Open source software 2
-
41Publicado 2014Libro electrónico
-
42
-
43Publicado 2017“…A few samples include training on how to build a multinode, secure Docker Swarm cluster; how to deploy and manage a multicontainer, highly available microservice app inside a cluster; a hands-on data science crash course for modeling and predicting the behavior of (large) distributed systems; and a course in Linux performance monitoring using BPF. …”
-
44
-
45Publicado 2016“…Run queries using the ReQL language Perform Geospatial queries (such as finding all the documents with locations within 5km of a given point). Deal with time series data, especially across various times zones. …”
Libro electrónico -
46Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
47Publicado 2021Tabla de Contenidos: “…-- 4.1.2 Identifying business capabilities -- 4.1.3 Example: Point-of-sale system -- 4.2 The secondary driver for scoping microservices: Supporting technical capabilities -- 4.2.1 What is a technical capability? …”
Libro electrónico -
48Publicado 2024Tabla de Contenidos: “…-- Windows Autopilot for existing devices -- Windows updates during the OOBE -- Auto-assigning Windows Autopilot profiles in Intune -- Signing in to Graph Explorer -- Enrollment Status Page (ESP) -- ESP implementation - Windows CSP -- Autopilot reporting and diagnostics -- Company Portal -- Configuring automatic BitLocker encryption for Autopilot devices -- Troubleshooting automatic BitLocker encryption on a VM -- Windows Hello for Business -- Cloud configuration scenario -- Introduction -- What you will need to continue -- Basics -- Resources to be created -- Apps -- Assignments -- Deploying…”
Libro electrónico -
49Publicado 2018Libro electrónico
-
50Publicado 2023Tabla de Contenidos: “…-- Redis as a primary database -- The BASE and ACID properties -- The BASE properties -- The ACID properties -- Configuring Redis for durability, consistency, and availability -- Configuring snapshots -- Configuring AOF -- Configuring high availability -- Configuring consistency -- Summary -- Chapter 12: Managing Development and Production Environments -- Technical requirements…”
Libro electrónico -
51Publicado 2018Tabla de Contenidos: “…-- Pure-play public cloud strategy -- Public cloud benefits -- Need for agility -- Ability to experiment without upfront cost -- Reducing operational overheads -- Ability to consume enhanced services -- Shortcomings of a public cloud -- Cost -- Control/customizability -- Compliance -- Fear of lock-in -- Hybrid cloud case study -- Summary - maximizing benefits -- Chapter 3: Hybrid Cloud Building Blocks -- The story of a web application -- Transport level -- Case 1 - without a proxy -- Case 2 - with a proxy -- Application level -- Web tier -- Application tier -- Database tier -- Putting it all together -- Use cases of a hybrid cloud -- Isolated use case -- Distributed use case -- Co-Existent use case -- Cloud bursting -- Using cognitive services -- Supporting application use cases -- Backup and disaster recovery in the cloud -- Decoupling the tiers -- Case in point - architecture of OpenStack -- Services to enable a hybrid cloud -- Network connectivity -- DNS service -- Public cloud services for hybrid deployment -- Amazon Web Services (AWS) -- Storage gateway -- Direct connect -- Route 53 -- Amazon EC2 run command -- VMware cloud on AWS -- Microsoft Azure -- Azure Stack -- Azure Site Recovery (ASR) -- Azure Traffic Manager -- Summary - setting up hybrid cloud -- Chapter 4: Architecting the Underpinning Services -- Networking -- Underlay network…”
Libro electrónico -
52Publicado 2023Tabla de Contenidos: “…-- 12.3.2 The traditional approach to API testing -- 12.3.3 Property-based testing with Hypothesis -- 12.3.4 Using Hypothesis to test a REST API endpoint -- 12.4 Testing REST APIs with Schemathesis -- 12.4.1 Running Schemathesis's default test suite -- 12.4.2 Using links to enhance Schemathesis' test suite -- 12.5 Testing GraphQL APIs -- 12.5.1 Testing GraphQL APIs with Schemathesis -- 12.6 Designing your API testing strategy -- Summary -- 13 Dockerizing microservice APIs -- 13.1 Setting up the environment for this chapter -- 13.2 Dockerizing a microservice -- 13.3 Running applications with Docker Compose -- 13.4 Publishing Docker builds to a container registry -- Summary -- 14 Deploying microservice APIs with Kubernetes -- 14.1 Setting up the environment for this chapter -- 14.2 How Kubernetes works: The "CliffsNotes" version -- 14.3 Creating a Kubernetes cluster with EKS -- 14.4 Using IAM roles for Kubernetes service accounts -- 14.5 Deploying a Kubernetes load balancer…”
Libro electrónico -
53Publicado 2021Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Introduction -- Chapter 1: Foundations in Cloud Computing -- The History of Cloud Computing -- A Brief History of Microsoft Azure -- Cloud Computing Types -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Cloud Service Models -- Infrastructure-as-a-Service (IaaS) -- Platform-as-a-Service (PaaS) -- Software-as-a-Service (SaaS) -- Public Cloud Benefits -- Easier Management -- Cost Efficiency -- Automation -- Security -- Scalability -- High Availability -- Geographies, Regions, and Pairing -- Subscriptions and Accounts -- Subscription -- Tenant and Accounts -- Role-Based Access Control (RBAC) -- Chapter Recap -- Chapter 2: Azure Administration -- Management Using Azure Portal -- Azure Cloud Shell -- Azure PowerShell -- Azure CLI -- ARM Template -- ARM Template Format -- ARM Template Example -- ARM Template File -- ARM Template Deployment -- Chapter Recap -- Chapter 3: Virtual Networks in Azure -- Virtual Networks and Subnets -- Virtual Network (VNet) -- Subnet -- Creating a Virtual Network and Subnets -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Network Interface Card (NIC) -- Creating a Network Interface Card -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- IP Addresses -- Creating IPs -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Network Security Groups (NSGs) -- Creating a Network Security Group -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Service Endpoints -- Creating a Service Endpoint -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Private Endpoints -- Creating a Private Endpoint -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Chapter Recap -- Chapter 4: Virtual Machine: Virtual Machine Scale Sets in Azure Compute -- Virtual Machine: Planning and Usage…”
Libro electrónico -
54Publicado 2017Libro electrónico
-
55Financial security for dummiesFinancial Security for DummiesPublicado 2022Tabla de Contenidos: “…Important things to know about the "news" media -- Getting media attention is a competitive business -- Controversial points of view often attract -- Political partisans can be hazardous to your wealth -- Uncovering Gurus' Agendas -- Figuring out what they're really selling -- Checking out their qualifications and track records -- Deciding Whether Hiring an Advisor Is the Right Choice -- Chapter 8 Following Financial Markets -- Understanding Stocks and Bonds -- Making Informed Investing Decisions -- Connecting corporate profits to stock prices -- Looking at financial market efficiency -- Focusing on interest rates, inflation, and the Federal Reserve -- Challenging Financial Markets During Changing Times -- What really moves financial markets (in the short term) -- Why market timing is so hard to do -- Part 4 Keeping Your Personal Finance House in Order -- Chapter 9 Getting on the Right Road with Spending and Saving -- Getting a Handle on Your Spending -- Differentiating necessities from luxuries -- Reducing your expenditures -- Setting and following a budget -- Some final spending reminders . . . -- Saving: Necessary Rocket Fuel -- Understanding compounded returns -- Considering your short- and long-term personal and financial goals -- Noting the power of tax-deferred retirement accounts -- Upping Your Income -- Lowering Your Tax Bill -- Knowing your income tax rate -- Using your income tax rate -- Taxing issues regarding children -- Making quarterly tax filing requirements -- Ouch! …”
Libro electrónico -
56Publicado 2022Libro electrónico
-
57Publicado 2018Libro electrónico
-
58Publicado 2023Tabla de Contenidos: “…Identify the business goals -- 4.2.6 Writing good business goals -- 4.2.7 Show me the money: Business goals and revenue -- 4.2.8 Popping the "why stack": Digging out the business goals -- 4.3 Impact Mapping -- 4.3.1 Identify the pain point -- 4.3.2 Define the business goal -- 4.3.3 Who will benefit? …”
Libro electrónico -
59Publicado 2018“…It also gives you a complete Platform as a Service offering by packaging Kubernetes, Container Registry, Container Runtime, and build and pipelines tools including Jenkins; it also creates best practices and integration out of the box. You can just point to your application code, and OpenShift builds and deploys it taking care of high availability, fault tolerance, scalability, self-healing, and reliability…”