Mostrando 50,861 - 50,880 Resultados de 51,395 Para Buscar 'ZCom~', tiempo de consulta: 0.88s Limitar resultados
  1. 50861
    Publicado 2023
    “…What You Will Learn Evolve from monolithic to the microservices architecture Implement effective microservices decomposition strategies Utilize communication patterns and API gateways Manage data and distributed transactions in microservices Enhance resilience and observability for microservices Audience This course is ideal for individuals seeking to become proficient in software architecture, explicitly focusing on understanding microservices architecture through real-world cases. …”
    Video
  2. 50862
    Publicado 2023
    “…Whether you're selecting your first JavaScript framework or seeking to stand out among job applicants by adding the latest technology to your resume, this book is your ultimate guide to becoming a SvelteKit master. A solid understanding of HTML, CSS, JavaScript, and Svelte is a must…”
    Libro electrónico
  3. 50863
    Publicado 2023
    “…An expert's guide to unleash your productivity potential for work and personal projects with Trello automation, advanced features, integrations, and Power-Ups Purchase of the print or Kindle book includes a free PDF eBook Key Features Uncover the secrets of Trello's core features, automation, and integrations to become a Trello power user Master Trello with practical advice, real-world examples, and workflows to improve task management Get in-depth knowledge of Trello to get it up and running within minutes and scale it for future needs Book Description Managing large projects and teams can be an immense challenge, but having an efficient project management system can make all the difference. …”
    Libro electrónico
  4. 50864
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Why Data Stewardship and Why Me? -- Chapter 1: From Business Strategy to Data Strategy to Data Stewardship -- Understanding the strategic, tactical, and operational value of data stewardship -- Bridging the gap between data strategy and data operation -- Unlocking business value with data stewardship -- Understanding business strategy -- Understanding data strategy -- Operationalizing your data strategy via data stewardship -- Exploring the mindset and skillset gap -- Translating strategy into execution -- Data collection -- Data governance framework -- Analytics and reporting tools -- Tracking progress -- Decoding data governance, management, and stewardship -- Data stewards don different hats -- Summary -- Chapter 2: How Data Stewardship Can Help Your Organization -- Defining data stewardship -- The work scope of a data steward -- Understanding the role of a data steward -- Types of data stewards -- Comparing strategic data stewardship with a standard operating procedure -- Using business cases for storytelling and value realization -- Creating a competitive edge with data stewardship -- Summary -- Chapter 3: Getting Started with the Data Stewardship Program -- Defining the origin and destination of your data stewardship program -- Getting buy-in of data stewardship from stakeholders -- Building a prioritization matrix -- The impact-effort matrix -- The RICE method -- MoSCoW analysis -- Comparing different prioritization matrices -- Assessing data maturity -- Building the foundation of your data stewardship program -- Summary -- Part 2: How to Become a Data Steward and Shine! …”
    Libro electrónico
  5. 50865
    Publicado 2024
    “…Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. …”
    Video
  6. 50866
    Publicado 2024
    Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT&amp -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
    Libro electrónico
  7. 50867
    Publicado 2020
    Tabla de Contenidos: “…Introduction -- Political spirituality -- Foucault's work and movements in 1978 and early 1979 -- Corriere Della Sera: A strange invitation -- Into the Incinerator, 16 September 1978 -- Foucault's most consequential Iran writings -- The backlash: Paris in turmoil, April 1979 -- Crucial perspectives from the Foucault scholarship, 1979-2017 -- What was there to liberate in Iran? …”
    Libro electrónico
  8. 50868
    Publicado 2021
    “…These include current and former faculty and students (ranging from academics such as Christopher Hood, Anne Phillips and Tony Travers, to graduates who have subsequently become politicians-such as Anneliese Dodds, former UK Shadow Chancellor of the Exchequer, and Kennedy Stewart and Michael Fougere, both mayors in Canada), as well as others with strong links to the Department, such as Meghnad (Baron) Desai, and Professors Tim Besley and Nick Barr. …”
    Libro electrónico
  9. 50869
    Publicado 2023
    “…The Alteryx platform allows users to access, cleanse, and integrate data from various sources, and perform statistical analysis, predictive modeling, and geospatial analysis. …”
    Video
  10. 50870
    Publicado 2023
    “…AI models like ChatGPT and DALL-E 2 are becoming increasingly sophisticated, enabling us to generate high-quality text and images at an unprecedented speed and scale. …”
    Video
  11. 50871
    Publicado 2023
    “…He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!…”
    Video
  12. 50872
    Publicado 2023
    Tabla de Contenidos: “…CHECKLIST FOR OBTAINING A URINE SPECIMEN FROM A FOLEY CATHETER -- 21.13. CHECKLIST FOR FOLEY REMOVAL -- 21.14. …”
    Libro electrónico
  13. 50873
    Publicado 2024
    Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
    Libro electrónico
  14. 50874
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  15. 50875
    Publicado 2024
    Tabla de Contenidos: “…Understanding DbContext pooling -- Understanding the difference between tracking versus no-tracking queries -- Understanding the difference between IQueryable and IEnumerable -- Client evaluation versus server evaluation -- Using raw SQL queries -- FromSql() and FromSqlRaw() -- SqlQuery() and SqlQueryRaw() -- ExecuteSql() and ExecuteSqlRaw() -- Using bulk operations -- ExecuteUpdate() -- ExecuteDelete() -- Understanding concurrency conflicts -- Native database-generated concurrency token -- Application-managed concurrency token -- Handling concurrency conflicts -- Reverse engineering -- Other ORM frameworks -- Summary -- Chapter 8: Security and Identity in ASP.NET Core -- Technical requirements -- Getting started with authentication and authorization -- Creating a sample project with authentication and authorization -- Understanding the JWT token structure -- Consuming the API -- Configuring the Swagger UI to support authorization -- Delving deeper into authorization -- Role-based authorization -- Claim-based authorization -- Understanding the authorization process -- Policy-based authorization -- Managing users and roles -- New Identity API endpoints in ASP.NET Core 8 -- Understanding OAuth 2.0 and OpenID Connect -- What is OAuth 2.0? …”
    Libro electrónico
  16. 50876
    Publicado 2024
    “…Ultimately, armed with the knowledge and skills acquired from this AWS security guide, you'll be well-prepared to pass the exam and design secure AWS solutions with confidence. …”
    Libro electrónico
  17. 50877
    Publicado 2022
    “…Get a step ahead of your competitors with insights from over 30 Kaggle Masters and Grandmasters. Discover tips, tricks, and best practices for competing effectively on Kaggle and becoming a better data scientist. …”
    Libro electrónico
  18. 50878
    Publicado 2024
    “…If you're new to React and looking to become a professional React developer, this book is for you. …”
    Libro electrónico
  19. 50879
    Publicado 2024
    “…By the end of this book, you'll be on your way to becoming a business leader--a changemaker of the future. …”
    Libro electrónico
  20. 50880
    Publicado 2023
    Tabla de Contenidos: “…-- Leadership styles and their origins -- Natural origins -- Philosophical origins -- Management theory origins -- Engineering leadership style archetypes -- The commander and the servant -- The coach and the delegator -- The communicator and the co-creator -- What is the right leadership style for me? …”
    Libro electrónico