Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 254
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
26381Publicado 2024“…Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the "three lines of defense" approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. …”
Libro electrónico -
26382Publicado 2024Tabla de Contenidos: “…Exploring different ways to merge in Git -- Navigating conflicts -- Why conflict happens -- How to merge conflicts in Git -- How to resolve merge conflicts -- Useful commands for supporting merge activities -- Mastering better collaboration -- Rolling back time -- Organizing your working environment -- Who did what? …”
Libro electrónico -
26383Publicado 2024Tabla de Contenidos: “…Use _over_time functions -- Anomaly detection -- Unit-testing alerting rules -- Summary -- Further reading -- Part 2: Scaling Prometheus -- Chapter 6: Advancing Prometheus - Sharding, Federation, and High Availability -- Technical requirements -- Prometheus' limitations -- Cardinality -- Long-term storage -- Sharding Prometheus -- Sharding by service -- Sharding with relabeling -- Federating Prometheus -- Achieving high availability (HA) in Prometheus -- HA via the Prometheus Operator -- Cleanup -- Summary -- Further reading -- Chapter 7: Optimizing and Debugging Prometheus -- Technical requirements -- Controlling cardinality -- Identifying cardinality issues -- Remediating cardinality issues -- Using limits -- Recording rules -- Recording rule conventions -- Scrape jitter -- Using pprof -- Using promtool for pprof data -- Query logging and limits -- Query logging -- Query limits -- Tuning garbage collection -- Using GOMEMLIMIT -- Summary -- Further reading -- Chapter 8: Enabling Systems Monitoring with the Node Exporter -- Technical requirements -- Node Exporter overview -- What is in an exporter? …”
Libro electrónico -
26384A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024Tabla de Contenidos: “…-- Moving to remote work -- LastPass hack -- Testing your home firewall -- Network access control (NAC) and Zero Trust -- Application firewall -- Mirai botnet -- Securing your browser -- Turning on your application firewall -- Okta hack -- Quick reference for endpoint security -- Summary -- Chapter 6: Data Safeguarding -- Offline backups -- Testing your backups -- Cryptographic hashing -- Availability in the cloud -- Business continuity -- Recovery time objective (RTO) -- Recovery point objective (RPO) -- Maximum tolerable downtime (MTD) -- Succession planning -- AWS DDOS attack -- Disaster recovery -- Redundancy in architecture -- Disaster recovery roles and responsibilities -- Testing disaster recovery -- Summary…”
Libro electrónico -
26385Publicado 2024“…Written by a principal architect at Google with 15+ years of experience, this vendor agnostic book begins by exploring the case studies of enterprises stepping into the world of the cloud, highlighting the pivotal role of leadership vision and mindset in driving digital transformation. …”
Libro electrónico -
26386Publicado 2023“…In this video course, industry expert, professor, and bestselling author Yuri Diogenes guides you through the steps toward a successful career in cybersecurity. Learn about the roles and responsibilities of a cybersecurity professional, the mindset and skills you need to succeed, and how you can build a network and ace your interview to level up in your career. …”
Video -
26387Publicado 2023“…Boost your C++ skills by working through realistic examples and exploring system specifications Key Features Master essential skills to build robust Linux systems Explore hands-on examples to demystify crucial development concepts, upskilling your system programming abilities Master the art of creating software for Linux systems and supercharge your C++ skills Purchase of the print or Kindle book includes a free PDF eBook Book Description Around 35 million Linux and almost 2 billion Android users rely on C++ for everything from the simplest embedded and IoT devices to cloud services, supercomputing, and space exploration. …”
Libro electrónico -
26388Publicado 2023“…Progress from novice to advanced through immersive learning. Suitable for roles like machine learning engineer, deep learning specialist, AI researcher, data scientist, and GAN developer. …”
Video -
26389Publicado 2023“…Currently, Bert holds a significant role at a leading wind turbine manufacturer, leveraging his expertise to contribute to innovative solutions. …”
Video -
26390“…Immer wieder gehen entscheidende Impulse von diesem Medium aus. Der exponierten Rolle dieses Genres entspricht seine wachsende Prominenz als Gegenstand der Medienwissenschaft. …”
Libro electrónico -
26391Publicado 2023Tabla de Contenidos: “…Mastering anonymization -- Masking personal identifiers -- Applying encryption methods -- Encryption basics -- SSL and TLS -- Foundations of maintenance and system updates -- Regular updates and version control -- Summary -- Chapter 16: Additional Interview Questions -- Index -- Other Books You May Enjoy…”
Libro electrónico -
26392Publicado 2023“…I see a once in a lifetime opportunity to not only elevate the leadership role of project professionals in their organization, thanks to the AI-driven disruption, but also to increase projects success rate by leveraging AI, while using it responsibly. …”
Libro electrónico -
26393Publicado 2023“…Those working in defensive security roles will also find this book useful to extend their cloud security skills…”
Libro electrónico -
26394por Azis, Iwan J.“…(Ludger Schuknecht, Former German Federal Ministry of Finance, ex-OECD Deputy Secretary-General, and currently Vice President and Corporate Secretary of the Asian Infrastructure Investment Bank (AIIB)) “The role of micro, small, and medium enterprises is crucial in contributing to the development process. …”
Publicado 2024
Libro electrónico -
26395Publicado 2024Tabla de Contenidos: “…Use case 10 - correcting configuration drift in a major energy company -- Future directions -- Summary -- Chapter 6: Performance Optimization Techniques -- Techniques to optimize Kubernetes performance -- Evaluating cluster resource allocation -- Optimizing container image size and management -- Network performance tuning -- Enhancing data storage performance -- Utilizing resource quotas and limits effectively -- Efficient logging and monitoring strategies -- Load balancing and service discovery optimization -- Implementing proactive node health checks -- Ensuring efficiency and scalability -- Designing for statelessness and scalability -- Adopting microservices architecture appropriately -- Cluster autoscaling techniques -- Horizontal versus vertical scaling strategies -- Utilizing cluster federation for scalability -- Efficient resource segmentation with namespaces -- Optimizing inter-pod communication -- Load testing and capacity planning -- Maximizing the potential of Kubernetes -- Harnessing Kubernetes extensibility with custom resources -- Integrating with cloud-native ecosystems -- Leveraging Kubernetes for continuous deployment -- Utilizing advanced scheduling features -- Container runtime optimization -- Effective data management and backup strategies -- Hybrid and multi-cloud deployment strategies -- Adopting GitOps for Kubernetes management -- Summary -- Part 3: Achieving Continuous Improvement -- Chapter 7: Embracing Continuous Improvement in Kubernetes -- The concept of continuous improvement -- Fundamentals of continuous improvement in Kubernetes -- The role of feedback loops in Kubernetes' evolution -- Comparing continuous improvement to traditional models -- Measuring success in continuous improvement initiatives -- The psychological aspect of cultivating a growth mindset -- Continuous learning…”
Libro electrónico -
26396por Anderson, Jesse“…Was Sie lernen werden Entdecken Sie die drei Teams, die Sie brauchen, um mit Big Data erfolgreich zu sein Verstehen, was ein Datenwissenschaftler ist und was ein Datenwissenschaftsteam tut Verstehen, was ein Data Engineer ist und was ein Data Engineering Team macht Verstehen, was ein Betriebsingenieur ist und was ein Betriebsteam tut Wissen, wie sich die Teams und Titel unterscheiden und warum Sie alle drei Teams brauchen Erkennen, welche Rolle das Unternehmen bei der Zusammenarbeit mit Datenteams spielt und wie der Rest der Organisation zu erfolgreichen Datenprojekten beiträgt Die Übersetzung wurde mit Hilfe von künstlicher Intelligenz durchgeführt. …”
Publicado 2024
Libro electrónico -
26397Publicado 2024Tabla de Contenidos: “…-- 5.3 How Many Types of Variables and Constants Exist? -- 5.4 Rules and Conventions for Naming Variables and Constants in C# -- 5.5 What Does the Phrase "Declare a Variable" Mean? …”
Libro electrónico -
26398por Raghavendra, Sujay“…What You Will Learn Understand the fundamentals of automated testing and the role of Selenium in web application testing Set up the Selenium WebDriver in Java and configure the testing environment Work with different web browsers and their drivers to perform cross-browser testing Identify and locate web elements using various locators, such as IDs, class names, CSS selectors, and XPath expressions Perform actions on web elements, such as clicking buttons, entering text, submitting forms, and navigating through web pages Handle dynamic pages by implementing effective wait mechanisms, including implicit waits, explicit waits, and fluent waits Verify and assert expected conditions and outcomes using assertions and verification techniques provided by Selenium in Java Apply best practices for test code organization and maintainability, including using the Page Object Model (POM) design pattern Handle advanced scenarios, such as working with iframes, and elevating Selenium automation through TestNG’s structured frameworks, data utilization, and parallel processing …”
Publicado 2024
Libro electrónico -
26399Publicado 2024“…Additionally, it serves business analysts and IT professionals aiming to leverage data analysis and database management in their roles…”
Libro electrónico -
26400Publicado 2024Tabla de Contenidos: “…-- 5.3 How Many Types of Variables and Constants Exist? -- 5.4 Rules and Conventions for Naming Variables and Constants in C# -- 5.5 What Does the Phrase "Declare a Variable" Mean? …”
Libro electrónico