Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 255
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
26521Publicado 2020“…Since March 2020, Zoom has rolled out hundreds of fixes and dozens of changes, all well documented in the book. …”
Libro electrónico -
26522Publicado 2014“…Prior to that, he occupied a similar role at Quartz (qz.com). In a previous life, he was a chemical engineer at a startup that was trying to turn wood chips and switchgrass into fuel. …”
-
26523Publicado 2014“…Skill Level All Levels What You Will Learn How to work with the Windows PowerShell console, ISE, applications, and extensions How to automate the management of services, processes, disks, volumes, roles, and Windows features How to perform complex tasks by combining multiple commands through the Pipeline How to access complex system information stored in the WMI repository How to use PowerShell to manage remote systems How to create reusable scripts that run smoothly in diverse environments How to create a Desired State Configuration with PowerShe..…”
-
26524por Strathausen, Roger. author“…Answer the questions that arise when managers and workers need to adjust to unfamiliar leadership roles and rules in flattened organizational forms. …”
Publicado 2015
Libro electrónico -
26525Publicado 2016“…The author also provides insight into the software-defined data center and the role that VMware vSphere plays in it. vSphere 6 Foundations (Exam #2V0-620) Complete Video Course contains 15 individual video modules with over 10 hours of video training. …”
-
26526Publicado 2019“…You will then dive into the core part of the CompTIA Linux+ exam, including advanced user settings, storage management, managing server roles, and both common and advanced system administration tasks. …”
-
26527Publicado 2023“…What you will learn Get to grips with new patterns and technologies used for cloud-native applications Migrate old applications and databases to Azure with ease Work with containers and orchestrators to automate app deployment Select the right Azure service for deployment as per the use cases Set up CI/CD pipelines to deploy apps and services on Azure DevOps Leverage Azure App Service to deploy your first application Build a containerized app using Docker and Azure Container Registry Who this book is for This book is for cloud developers, software architects, system administrators, developers, and computer science students looking to understand the new role of the software architect or developer in the cloud world. …”
Libro electrónico -
26528Publicado 2023Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Building Cloud-Oriented Apps Using Patterns and Technologies -- Chapter 1: Introduction to Serverless Architecture, Event-Driven Architecture, and Cloud Databases -- Understanding serverless architecture -- API definition -- The API life cycle -- An APIs role -- API types -- Understanding event-driven architecture -- Exploring cloud databases -- Summary -- Further reading -- Questions -- Chapter 2: API Management - Import, Manage, and Publish Your First API -- Technical requirements -- The API Gateway pattern -- Definition -- Use case -- Exploring the API Management service -- API Management components -- Products -- Securing the API -- Subscriptions and keys -- The process of calling an API with the subscription key -- Securing APIs by using certificates -- Accepting client certificates in the consumption tier -- Certificate authorization policies -- Exercise 1 - creating a backend API and deploying APIs -- Creating an API Management instance -- Importing an API -- Configuring the backend settings -- Testing the API -- Exercise 2 - using Azure API Management to proxy a public API -- Importing an OpenAPI schema for proxying -- Summary -- Chapter 3: Developing Event-Based and Message-Based Solutions -- Introduction -- Exploring Event Grid and Azure Event Hubs -- Event Grid -- Event Hubs -- Exercise 1 - publishing and subscribing from a .NET app to Event Grid events -- Creating an Event Grid topic -- Creating a web app to deploy the Azure Event Grid viewer -- Creating an Event Grid subscription -- Create a .NET Console project -- Making some modifications to the Program class to be able to connect to Event Grid -- Publishing new events -- Exploring Azure message queues…”
Libro electrónico -
26529Publicado 2023“…Upon completing the course, you will understand the roles and impacts of recommender systems in real-world applications with a unique hands-on experience in developing complete recommender system engines for customized datasets in various projects. …”
Video -
26530Publicado 2023“…With a diversified background across multiple domains, Vijay has proven himself a valuable asset to his current role as a leading cloud service provider. His strong focus on automation has resulted in significant cost savings for the business, making him a valuable asset to the team. …”
Video -
26531Publicado 2023“…With a diversified background across multiple domains, Vijay has proven himself a valuable asset to his current role as a leading cloud service provider. His strong focus on automation has resulted in significant cost savings for the business, making him a valuable asset to the team. …”
Video -
26532Publicado 1993“…The interiorist and global method which he followed upturned islamology, and his studies added a spiritual dimension to the field which it never had before. His method relied upon a philosophy of finalist and eschatological history which exclusively considers relations between mankind and transcendance. …”
Libro electrónico -
26533Publicado 1993“…Yet the question ofzanādiqa in Islam, although the subject of numerous previous works, still remained incomplète. The author, relying on all the available documentation, thus embarked on a ..…”
Libro electrónico -
26534Publicado 2024Tabla de Contenidos: “…-- Chapter 5: Designing Authentication and Authorization -- Technical requirements -- Designing an auth workflow -- JWT life cycle -- TypeScript operators for safe data handling -- Null and undefined checking -- The conditional or ternary operator -- The null coalescing operator -- The nullish coalescing operator -- Optional chaining -- Implementing data entities and interfaces -- Classes, Interfaces, and Enums -- Reusable services leveraging OOP concepts -- Creating an auth service -- Implement an abstract auth service -- Abstract functions -- A cache service using localStorage -- Caching the JWT -- An in-memory auth service -- Simple login -- Logout -- Resuming a JWT session -- An HTTP interceptor -- Summary -- Further reading -- Questions -- Chapter 6: Implementing Role-Based Navigation -- Technical requirements -- Dynamic UI components and navigation -- Implementing the login component -- Conditional navigation -- Common validations for forms -- UI service using environment provider -- Side navigation -- Role-based routing using guards -- Route guards -- Auth guards -- Auth service fake and common testing providers -- A Firebase authentication recipe -- Create a Firebase application…”
Libro electrónico -
26535Publicado 2024Tabla de Contenidos: “…A DevOps implementation checklist -- Final thoughts and recommendations -- Index -- Other Books You May Enjoy -- _Int_NAHIjC2S -- _Int_mF6xDJN9 -- _Int_zp0pBQVx -- _Int_6cHBZiOj -- _Int_w5kp2y6C -- _Int_yWNgT2rT -- _Int_9Yfi9T5P -- _Int_EmQ6OPxG -- _Int_C76eUmlv -- _Int_XNZ3Yiz4 -- _Int_uxzli2a7 -- _Int_tYbRUpFK -- _Int_e6m5QXSH -- _Int_t8VtjjVm -- _Int_943LjL2p -- _Int_9rn533TM -- _Int_cxBjsw7C -- _Int_gV4rM2sB -- _Int_7hsJKcM3 -- _gjdgxs -- _30j0zll -- _Int_GHDWQPnp -- _Int_Nfre2moC -- _Int_n43i9fk4 -- _Int_XOaTUCBF -- _Int_XO8phqQk -- _Int_r020DQXF -- _Int_EESv3rO1 -- _Int_8CpR2tmb -- _Int_daw1t098 -- _Int_479GNkyU -- _Int_9UXcnjdr -- _Int_0z75wCtD -- _Int_6PghCJOi -- _Int_5ics29nI -- _Int_SGyvkraz -- _Int_kEcCIYQF -- _Int_QKLPZiwT -- _Int_t8be7ZnB -- _Int_jtkPQXaP -- _Int_YrbKRLF2 -- _Int_ks9AxS7c -- _Int_rGSWW6j1 -- _Int_lC0B6Unu -- _Int_qiWjwyM6 -- _Int_DF5E683s -- _Int_AzMiZFFe -- _Int_r7ShWQw2 -- _Int_RbJgmben…”
Libro electrónico -
26536Publicado 2024Tabla de Contenidos: “…Chapter 11: Shield Right for APIs with Runtime Protection -- Technical requirements -- Securing and hardening environments -- Container images -- Operating systems -- Using WAFs -- Understanding the Next-Generation Firewall (NGWAF) and Web Application API Protection (WAAP) products -- Using API gateways and API management -- Implementing security patterns in the Kong API gateway -- Best practices for API gateway protection -- Deploying API firewalls -- API monitoring and alerting -- Selecting the correct protections for your APIs -- Summary -- Further reading -- Chapter 12: Securing Microservices -- Technical requirements -- Understanding microservices -- Securing the foundations of microservices -- Securing the connectivity of microservices -- Access control for microservices -- Running secure microservices in practice -- Summary -- Further reading -- Chapter 13: Implementing an API Security Strategy -- Ownership of API security -- Understanding your stakeholders -- Roles and responsibilities -- The 42Crunch maturity model -- Inventory -- Design -- Development -- Testing -- Protection -- Governance -- Planning your program -- Establishing your objectives -- Assessing your current state -- Building a landing zone for APIs -- Running your program -- Building your teams -- Tracking your progress -- Integrating with your existing AppSec program -- Your personal API security journey -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico -
26537por Lynn, Theo“…Professor Lynn specialises in the role of digital technologies in transforming business processes and society with a specific focus on cloud computing, social media and data science. …”
Publicado 2024
Libro electrónico -
26538Publicado 2024“…With the help of examples, you'll learn fundamental data concepts, including data representation, data storage options, and common workloads and gain clarity on the roles and responsibilities of key data professionals such as data administrators, engineers, and analysts. …”
Libro electrónico -
26539Publicado 2024Tabla de Contenidos: “…-- Enabling data pipeline experimentation as datasets are readied -- Releasing data like code -- Challenges and considerations -- SBP 12 - choose languages with solid reasoning -- Key languages in data engineering and their roles -- The pressures and limitations imposed by PaaS offerings -- Pitfalls to avoid -- SBP 13 - drive scripting and PaaS code with parameterization using a secure configuration management repository tool -- The power of parameterization and configuration management -- The growth of configuration complexity -- Why parameterize? …”
Libro electrónico -
26540Publicado 2023Tabla de Contenidos: “…. -- Chapter 6: Security -- An overview of PostgreSQL security -- Typical user roles -- The PostgreSQL superuser -- How to do it... -- How it works... -- There's more... -- Other superuser-like attributes -- See also…”
Libro electrónico