- Table View
- List View
CCST Cisco Certified Support Technician Study Guide: Networking Exam
by Todd Lammle Donald RobbThe ideal prep guide for earning your CCST Networking certification CCST Cisco Certified Support Technician Study Guide: Networking Exam is the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco networking guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach, providing 100% coverage of CCST Networking exam objectives. You’ll find detailed information and examples for must-know Cisco networking topics, as well as practical insights drawn from real-world scenarios. This Study Guide provides authoritative coverage of key exam topics, including standards and concepts, addressing and subnet formats, endpoints and media types, infrastructure, diagnosing problems, and security. You also get one year of FREE access to a robust set of online learning tools, including a test bank with hundreds of questions, a practice exam, a set of flashcards, and a glossary of important terminology. The CCST Networking certification is an entry point into the Cisco certification program, and a pathway to the higher-level CCNA, so it’s a great place to start as you build a rewarding career! Study 100% of the topics covered on the Cisco CCST Networking certification exam Get access to flashcards, practice questions, and more great resources online Master difficult concepts with real-world examples and clear explanations Learn about the career paths you can follow and what comes next after the CCSTThis Sybex study guide is perfect for anyone wanting to earn their CCST Networking certification, including entry-level network technicians, networking students, interns, and IT professionals.
CDO & MAPI Programming with Visual Basic
by Dave GrundgeigerComputers and devices are more connected now than ever before. Why? Because the humans who use those computers need to collaborate. We need to share information, and we need to do it quickly, without regard to the physical distance that separates us. Corporate solution developers now more than ever have the opportunity and responsibility to enable people to communicate in ways never before possible. CDO and MAPI Programming with Visual Basic: Developing Mail and Messaging Applications dives deep into Microsoft's Collaboration Data Objects (CDO) and the Messaging Application Programming Interface (MAPI), then moves into succinct explanations of the types of useful messaging applications that can be written in Visual Basic. Microsoft has given the Visual Basic community Collaboration Data Objects (CDO)--a technology that goes far beyond simple email, fully into the realm of information workflow. CDO enables Visual Basic applications to exchange not only classic email, but in fact any information in a straightforward and easy way. The Internet--sometimes seen as a barrier by developers--is turned into an open pipe, ready to take your application's data around the world. Routing documents and building email list servers is just the beginning. Harness the power of worldwide communication in your everyday business applications. MAPI is the cornerstone of messaging on the Windows platforms, and profoundly influences the way you will write your collaboration applications. Understanding this technology lays the foundation for adding effective collaboration capabilities to your own applications. CDO and MAPI Programming with Visual Basic: Developing Mail and Messaging Applications fills a gap in an exciting and relatively young, yet popular, technology that lacks adequate documentation.
CDOs im öffentlichen Sektor: Perspektiven auf Chief Digital Officers und Strategien zur digitalen Transformation
by Christian SchachtnerDieses Buch untersucht die Notwendigkeit innovativer Ansätze zur Administrationsdigitalisierung, indem Technologien wie KI, Blockchain und intelligente Prozesse genutzt werden, um den Erwartungen der Bürger gerecht zu werden. Besonderes Augenmerk liegt auf der Rolle der Chief Digital Officers (CDOs) bei der erfolgreichen digitalen Transformation innerhalb öffentlicher Institutionen. Die digitale Verwaltung erfordert frische Impulse, um mit den Fortschritten im Industriesektor Schritt zu halten, indem Technologien wie KI-gesteuerte Automatisierung, Blockchain-Transaktionen und Sicherheitswerkzeuge eingesetzt werden. Intelligente Prozesslösungen werden als transformativ angesehen, um die Service-Standards gemäß den Erwartungen der Bürger an den Staat aufrechtzuerhalten. Im Gegensatz zu kommerziellen Unternehmen bietet die Zusammenarbeit denjenigen, die die Digitalisierung im öffentlichen Sektor überwachen, erweiterte Skalierungsmöglichkeiten, indem sie auf Erfahrungen aus anderen Regionen und Metropolen zurückgreifen, die direkt anwendbar und wiederverwendbar sind. Im öffentlichen Bereich spiegeln digitale Strategien rechtliche und soziale Bedingungen wider, was Anpassungen und Anpassungsoptionen für Chief Digital Officers erforderlich macht, während sie die digitale Transformation leiten. Methodische Schwerpunkte in der Neugestaltung von Aufgabenstrukturen, Prozessoptimierung und der Motivation von Akteuren ergeben vielfältige Handlungsfelder für die neue Rolle des CDO in öffentlichen Institutionen. Dieses Buch untersucht die Instrumente, Strategien und Einstellungen, die notwendig sind, um transformative Initiativen in Organisationen erfolgreich umzusetzen, und betont bewährte Konzepte mit praktischer Anwendbarkeit, die es den Lesern ermöglichen, ihre eigenen Interaktionsmöglichkeiten als digitale Führungspersönlichkeiten abzuleiten. Das Buch ist eine prägnante Einführung in die spezifischen Anforderungen an visionäre Gestalter, die dynamische Veränderungen in nutzerzentrierten öffentlichen Dienstleistungen vorantreiben.
CDOs in the Public Sector: Perspectives on Chief Digital Officers and Digital Transformation Strategies (SpringerBriefs in Applied Sciences and Technology)
by Christian SchachtnerThis book explores the need for innovative approaches to administrative digitization, leveraging technologies such as AI, blockchain, and smart processes to meet citizens' expectations, with a particular focus on the role of Chief Digital Officers (CDOs) in driving successful digital transformations within public institutions. Administrative digitization requires fresh inputs to match the leaps seen in the industry sector, utilizing technologies like AI-driven automation, blockchain transactions, and security tools. Smart process solutions are seen as transformative in upholding service standards aligned with citizens' state expectations. Unlike commercial companies, collaboration offers those overseeing public sector digitization enhanced scaling opportunities by drawing from experiences in other regions and metropolises, directly applicable and reusable. In the public realm, digital strategies mirror legal and social conditions, necessitating adjustments and adaptation options for Chief Digital Officers as they lead digital transformation. Methodological focal points in task structure redesign, process optimization, and motivating actors yield diverse action areas for the CDO's new role in public institutions. This book explores the instruments, strategies, and attitudes necessary to successfully implement transformative initiatives in organizations, emphasizing proven concepts with practical applicability, enabling readers to derive their own interaction options as digital guidance leaders. The book is a concise introduction to the specific requirements for visionary designers driving dynamic changes in user-centric public services.
CEH v10 Certified Ethical Hacker Study Guide
by Ric MessierAs protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
CEH v11 Certified Ethical Hacker Study Guide
by Ric MessierAs protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
CEH v11: Certified Ethical Hacker Version 11 Practice Tests
by Ric MessierMaster CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Sybex Study Guide)
by Ric MessierThe latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.
CEH v9: Certified Ethical Hacker Version 9
by OriyanoThe ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. Review all CEH v9 topics systematically Reinforce critical skills with hands-on exercises Learn how concepts apply in real-world scenarios Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam--making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors.
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
by Raymond BlockmonMaster CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all five sections of the CEH v9 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of new vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.
CEH: Certified Ethical Hacker Version 8 Study Guide
by Sean-Philip OriyanoPrepare for the new Certified Ethical Hacker version 8 examwith this Sybex guideSecurity professionals remain in high demand. The CertifiedEthical Hacker is a one-of-a-kind certification designed to givethe candidate a look inside the mind of a hacker. This study guideprovides a concise, easy-to-follow approach that covers all of theexam objectives and includes numerous examples and hands-onexercises. Coverage includes cryptography, footprinting andreconnaissance, scanning networks, enumeration of services, gainingaccess to a system, Trojans, viruses, worms, covert channels, andmuch more. A companion website includes additional study tools,Including practice exam and chapter review questions and electronicflashcards.Security remains the fastest growing segment of IT, and CEHcertification provides unique skillsThe CEH also satisfies the Department of Defense's 8570Directive, which requires all Information Assurance governmentpositions to hold one of the approved certificationsThis Sybex study guide is perfect for candidates studying ontheir own as well as those who are taking the CEHv8 courseCovers all the exam objectives with an easy-to-followapproachCompanion website includes practice exam questions, flashcards,and a searchable Glossary of key termsCEHv8: Certified Ethical Hacker Version 8 Study Guide isthe book you need when you're ready to tackle this challengingexamAlso available as a set, Etical Hacking and Web Hacking Set,9781119072171 with The Web Application Hacker's Handbook:Finding and Exploiting Security Flaws, 2nd Edition.
CFEngine 3 Beginner’s Guide
by RajneeshPart of Packt's Beginner's Guide series, this book guides you through setting up Cfengine to maximizing its potential. This book focuses on getting you through all the major learning points in a smooth, logical order. You'll also learn how to avoid some common pitfalls. If you are a System Administrator or Configuration manager with a growing infrastructure and if you are looking for a dependable tool to manage your infrastructure, then this book is for you. If your infrastructure is already big with hundreds and thousands of nodes and you are looking for a secure, versatile and stable configuration management tool, you will still find this book handy. You don't need any prior experience of Cfengine to follow this book.
CFN Lectures on Functional Nanostructures - Volume 2: Nanoelectronics (Lecture Notes in Physics #820)
by Christian Röthig Matthias Vojta Gerd SchönThis series of books contains selected and edited lectures from summer schools organized by the Center for Functional nanostructures (CFN) at the University of Karlsruhe. The mission of the CFN is to carry out research in the following areas: nanophotonics, nanoelectronics, molecular nanostructures and nanostructured materials. The aim of the summer schools is mainly to exchange new ideas and illustrate emerging research methodologies through a series of topical, introductory lectures. This is reflected by both the selection of topics addressed in the present volume, nanoelectronics, as well as the tutorial aspect of the contributions.
CGI Manual of Style
by Robert McdanielAnyone can put a site up on the Web-but what makes people come back again and again? This indispensable reference is your guide to CGI (Common Gateway Interface), the key to tailoring your site to suit your visitors' needs by controlling and analyzing the flow of information on your site. No experience with C or Perl is assumed. Real-world examples are presented in easy-to follow tutorials.
CGI Programming with Perl, 2nd Edition
by Gunther Birznieks Scott Guelich Shishir GundavaramProgramming on the Web today can involve any of several technologies, but the Common Gateway Interface (CGI) has held its ground as the most mature method--and one of the most powerful ones--of providing dynamic web content. CGI is a generic interface for calling external programs to crunch numbers, query databases, generate customized graphics, or perform any other server-side task. There was a time when CGI was the only game in town for server-side programming; today, although we have ASP, PHP, Java servlets, and ColdFusion (among others), CGI continues to be the most ubiquitous server-side technology on the Web. CGI programs can be written in any programming language, but Perl is by far the most popular language for CGI. Initially developed over a decade ago for text processing, Perl has evolved into a powerful object-oriented language, while retaining its simplicity of use. CGI programmers appreciate Perl's text manipulation features and its CGI.pm module, which gives a well-integrated object-oriented interface to practically all CGI-related tasks. While other languages might be more elegant or more efficient, Perl is still considered the primary language for CGI. CGI Programming with Perl, Second Edition, offers a comprehensive explanation of using CGI to serve dynamic web content. Based on the best-selling CGI Programming on the World Wide Web, this edition has been completely rewritten to demonstrate current techniques available with the CGI.pm module and the latest versions of Perl. The book starts at the beginning, by explaining how CGI works, and then moves swiftly into the subtle details of developing CGI programs. Topics include: Incorporating JavaScript for form validation Controlling browser caching Making CGI scripts secure in Perl Working with databases Creating simple search engines Maintaining state between multiple sessions Generating graphics dynamically Improving performance of your CGI scripts
CGI Programming with Perl: Creating Dynamic Web Pages
by Gunther Birznieks Scott Guelich Shishir GundavaramProgramming on the Web today can involve any of several technologies, but the Common Gateway Interface (CGI) has held its ground as the most mature method--and one of the most powerful ones--of providing dynamic web content. CGI is a generic interface for calling external programs to crunch numbers, query databases, generate customized graphics, or perform any other server-side task. There was a time when CGI was the only game in town for server-side programming; today, although we have ASP, PHP, Java servlets, and ColdFusion (among others), CGI continues to be the most ubiquitous server-side technology on the Web.CGI programs can be written in any programming language, but Perl is by far the most popular language for CGI. Initially developed over a decade ago for text processing, Perl has evolved into a powerful object-oriented language, while retaining its simplicity of use. CGI programmers appreciate Perl's text manipulation features and its CGI.pm module, which gives a well-integrated object-oriented interface to practically all CGI-related tasks. While other languages might be more elegant or more efficient, Perl is still considered the primary language for CGI.CGI Programming with Perl, Second Edition, offers a comprehensive explanation of using CGI to serve dynamic web content. Based on the best-selling CGI Programming on the World Wide Web, this edition has been completely rewritten to demonstrate current techniques available with the CGI.pm module and the latest versions of Perl. The book starts at the beginning, by explaining how CGI works, and then moves swiftly into the subtle details of developing CGI programs.Topics include:Incorporating JavaScript for form validationControlling browser cachingMaking CGI scripts secure in PerlWorking with databasesCreating simple search enginesMaintaining state between multiple sessionsGenerating graphics dynamicallyImproving performance of your CGI scripts
CHART: Designing Creative Data Visualizations from Charts to Art (AK Peters Visualization Series)
by Nadieh BremerCHART is a guide to unleashing creativity in data visualization. It takes you on a journey along the spectrum from an ordinary chart to data art, packed with ways to bring more creativity into any visualization. It will help to make your visuals more compelling and memorable, long after the numbers have been crunched.Drawing from over a decade of experience, the author shares thirteen hands-on, tool-agnostic lessons, each filled with actionable insights and unique perspectives. Between these core lessons, you’ll find tips, mini-chapters, and dozens of real-world examples from both client and personal projects. The book also includes exclusive glimpses into early sketches, works-in-progress, and in-depth design stories that reveal how creativity in data is often a messy, non-linear, but ultimately rewarding process. CHART: Designing Creative Data Visualization from Charts to Art is designed for journalists, data analysts, business professionals, and newcomers alike, these lessons empower readers to push beyond the default. By the end of the book, you’ll have the tools and inspiration to transform typical charts and graphs into visuals that not only inform but also captivate and connect with your audience. This book invites you to break the mold and think outside the chart.
CI/CD Pipeline Using Jenkins Unleashed: Solutions While Setting Up CI/CD Processes
by Pranoday Pramod DingareUnderstand continuous integration (CI), continuous delivery, and continuous deployment (CD) with Jenkins. These processes allow users as well as administrators to catch problems as soon as they get injected into software systems.This book starts with an introduction to Jenkins and covers its architecture and role in CI/CD. The basics are covered, including installing and configuring Jenkins. Tool configuration and plugins are discussed as well as available security measures such as credentials. You will learn what is meant by Job in Jenkins, its types, sections, and much more. You will look at Java API: projects, jobs, configuration. The concluding chapters take you through creating pipelines, their role in managing web apps, and distributed pipelines. The book also covers unit testing using TestNG as well as end-to-end testing using Selenium Python as a part of building a life cycle and setting up Jenkins on different physical and Docker environments as well as Jenkins integration with cloud environments such as AWS. And you will learn how to create reusable libraries for use in Jenkins Pipeline and control Jenkins servers using Jenkins CLI and REST APIs. The new Jenkins Blue Ocean also is covered. The book helps you understand CI/CD implementation using Jenkins from scratch in your projects and prepare for end-to-end DevOps practices. What You Will LearnApply Jenkins to create end-to-end pipelinesIntegrate Jenkins with AWS, Docker, Git, and many more toolsUse Selenium automation for end-to-end testingCreate distributed pipelines Who Is This Book ForDevelopers and test automation professionals who are involved in creating CI/CD pipelines as well as prospective DevOps aspirants who want to make their way ahead as professionals
CI/CD Unleashed: Turbocharging Software Deployment for Quicker Delivery (Apress Pocket Guides)
by Tommy ClarkThe ability to deliver software quickly and efficiently is paramount to a company’s success. This book is a comprehensive guide to continuous integration (CI) and continuous delivery (CD), providing insights and practical strategies for streamlining the software delivery pipeline for speedy and efficient deployments. You’ll start by reviewing the fundamentals of CI/CD, and how it enables teams to automate the building, testing, and deployment of software, for faster and more reliable releases. The book then examines CI/CD pipelines, tooling, caching, and how to leverage these tools to expedite delivery workflows, before highlighting the increased importance of testing and monitoring during that process. You’ll also gain insights into various testing methodologies and learn how to implement them effectively within your CI/CD pipelines. However, the journey towards accelerated software delivery is not just about technology. It also requires a cultural shift within your software development team. The book accomplishes this by delving into strategies for getting apprehensive team members on board. CI/CD Unleashed provides the tools and techniques you need to ensure the quality and reliability of your software, while staying relatively agnostic regarding things like language and framework choices. You Will Understand the advantages continuous integration and continuous delivery provide. Explore how to automate the building, testing, and deployment of software for faster releases. See how CI/CD can aid a cultural shift within software development teams. Implement CI/CD best practices to deliver streamlined and more cost-effective deployments for your organization. Review WIP limits, small batch releases, and the importance of fostering a blame-free culture. Apply various testing methodologies such as unit testing, integration testing, and end-to-end testing. Who This Book Is For Senior software engineers, technical leaders, and business managers who are looking to deliver change for their customers, and make their business quicker.
CIGOS 2021, Emerging Technologies and Applications for Green Infrastructure: Proceedings of the 6th International Conference on Geotechnics, Civil Engineering and Structures (Lecture Notes in Civil Engineering #203)
by Cuong Ha-Minh Anh Minh Tang Tinh Quoc Bui Xuan Hong Vu Dat Vu Khoa HuynhThis book highlights the key role of green infrastructure (GI) in providing natural and ecosystem solutions, helping alleviate many of the environmental, social, and economic problems caused by rapid urbanization. The book gathers the emerging technologies and applications in various disciplines involving geotechnics, civil engineering, and structures, which are presented in numerous high-quality papers by worldwide researchers, practitioners, policymakers, and entrepreneurs at the 6th CIGOS event, 2021. Moreover, by sharing knowledge and experiences around emerging GI technologies and policy issues, the book aims at encouraging adoption of GI technologies as well as building capacity for implementing GI practices at all scales. This book is useful for researchers and professionals in designing, building, and managing sustainable buildings and infrastructure.
CIM Justification and Optimisation
by Sev V NagalingamThis book provides a justification and optimisation model that is complete enough to capture the important features required for a complex decision-making environment for computer integrated manufacturing investment analysis. The model provides facilities to quantify qualitative attributes.
CIRP Novel Topics in Production Engineering: Volume 1 (Lecture Notes in Mechanical Engineering)
by Tullio TolioThis is the first volume in the CIRP Novel Topics in Production Engineering (CNTPE), a collection of essays addressing novel research areas in production engineering, published regularly in book volumes. Each essay provides a systematization and explanation of a technology, an approach, a process, etc., and covers a novel research area once it has been published in the scientific literature for few years. The essays provide focused and structured knowledge of a defined and limited subject in terms of detailed implementation, a systematic description of theoretical hypotheses and results, constructive and design characteristics for a product/process or experiment, and exemplary applications to real cases. These constitute the background knowledge for scientists/professionals to approach a novel scientific and technological area - addressing background concepts, relevant tools and methodologies, language, and theory.
CISA - Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems
by Hemang DoshiThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.
CISA Certified Information Systems Auditor Practice Tests
by Mike Chapple Peter H. GregoryImprove your understanding of every CISA exam domain and objectives to further your career in information security auditing CISA Certified Information Systems Auditor Practice Tests provides essential and practical exam prep for the popular CISA certification. Hundreds of domain-by-domain practice questions cover all of the tested Certified Information Systems Auditor exam objectives, helping you prepare for the test and for the real-world demands of a career in systems audit, security, and control. Just like the real exams, the practice questions written by veteran information security experts Peter Gregory and Mike Chapple cover the information system auditing process, the governance and management of IT, information systems acquisition, development, and implementation, information systems operations and business resilience, and the protection of information assets. These rigorous and realistic practice questions will get you ready whether this is your first role in the industry or if you are experienced and ready to advance your career. By studying the domain-by-domain questions and well as taking the full chapter practice exams, you'll get help in identifying your subject-matter strengths and weaknesses and be ready to shift from topic to topic in an exam-like setting. In the book, you'll get: Challenging questions designed to advance your understanding and comprehension of all covered exam domains Questions as similar as possible to the real CISA exam questions Complimentary access to online version of the same questions to practice your online test-taking skills Perfect for everyone studying for the CISA Certified Information Systems Auditor certification exam, this book will also benefit IT security professionals seeking to test and improve their skillset.
CISA Certified Information Systems Auditor Study Guide
by David L. CannonThe industry-leading study guide for the CISA exam, fully updatedMore than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated twice a year, and this is the most up-to-date book available to prepare aspiring CISAs for the next exam.CISAs are among the five highest-paid IT security professionals; more than 27,000 take the exam each year and the numbers are growing Standards are updated twice a year, and this book offers the most up-to-date coverage as well as the proven Sybex approach that breaks down the content, tasks, and knowledge areas of the exam to cover every detail Covers the IS audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, protecting information assets, disaster recovery, and more Anyone seeking Certified Information Systems Auditor status will be fully prepared for the exam with the detailed information and approach found in this book.CD-ROM/DVD and other supplementary materials are not included as part of the e-book file, but are available for download after purchase