Browse Results

Showing 76 through 100 of 11,697 results

Oregon Math 2024 Grade 4

by Ron Larson & Laurie Boswell

Oregon Math 2024 Grade 4

Oregon Math 2024 Grade 3

by Ron Larson & Laurie Boswell

Oregon Math 2024 Grade 3

Oregon Math 2024 Grade 2

by Ron Larson & Laurie Boswell

Oregon Math 2024 Grade 2

Oregon Math 2024 Grade 1

by Ron Larson & Laurie Boswell

Oregon Math 2024 Grade 1

Oregon Math 2024 Grade K

by Ron Larson & Laurie Boswell

Oregon Math 2024 Grade K

Cloud-Native DevOps: Building Scalable and Reliable Applications

by Mohammed Ilyas Ahmed

This book delivers cloud-based applications that are both scalable and reliable, aligning with the evolving needs of the present user base. This innovative approach blends the agility of cloud computing with the efficiency of contemporary DevOps methodologies. The book starts by providing valuable insights into the ever-evolving software landscape of Cloud-native DevOps. It delves into strategies for crafting scalable and dependable applications and illustrates the art of leveraging open-source tools to enhance collaboration. It navigates through the integral role of microservices in contemporary software development and imparts the know-how to integrate them with DevOps practices. The book simplifies container technology, with a focus on Docker and Kubernetes. It further elucidates the process of streamlining software delivery through Continuous Integration and Continuous Deployment (CI/CD). As you progress, you will explore open-source tools, including Argo, Kubeflow Pipelines, and AWS Step Functions. The concluding section covers real-world case studies and best practices for implementing Cloud-native DevOps. The book reviews the core concepts covered throughout and provides an exciting glimpse into the future of Cloud-native DevOps. Upon completing this book, you will be well-versed in the principles and practices of Cloud-native DevOps, understand real-world applications, and recognize the critical importance of security in cloud computing. What You Will Learn Create cloud-based applications that can scale with the changing needs of today's user base Combine the flexibility of cloud computing with the efficiency of modern DevOps methodologies Understand the core concepts and principles of Cloud-native DevOps Understand microservices, containers, and continuous integration and continuous deployment (CI/CD) Who This Book Is For DevOps engineers, cloud architects, software developers, system administrators, IT managers, team leads, and business decision makers

The IT Support Handbook: A How-To Guide to Providing Effective Help and Support to IT Users

by Mike Halsey

Become a more effective tech professional by learning how to provide the most useful IT support for your users. You'll learn how to efficiently and effectively deal with any type of problem, including operating systems, software, and hardware. IT support is often complex, time-consuming, and expensive, but it doesn't have to be with the right processes in place. Whether you're an individual, part of an IT support team, or managing staff supporting PC users in their homes, this book will help you understand the right way to approach, troubleshoot, and isolate problems so they can be handled efficiently, with the least disruption and cost to your business. Expanded and revised for this second edition, you'll make yourself popular with your colleagues, and keep your clients and users happy and productive. New To This Edition The world of work has changed, with remote and hybrid working now the new normal and with IT Support departments worldwide having to adapt to this new paradigm. This expanded edition highlights the skills, tools, and structures needed to support businesses of any size in the new normal. What You'll Learn Manage reporting, and keep a record of issues that occur Provide effective remote support for users working from home or elsewhere in the world Use error and system reporting in Windows to obtain high-quality, relevant information Spot patterns in user behavior that may be causing difficult-to-diagnose problems Be familiar with best practices to make you a better support professional Who This Book Is For IT professionals, IT support (on-site and remote), and system administrators who manage support teams. No prior knowledge is required.

MLOps with Ray: Best Practices and Strategies for Adopting Machine Learning Operations

by Max Pumperla Zhe Zhang Hien Luu

Understand how to use MLOps as an engineering discipline to help with the challenges of bringing machine learning models to production quickly and consistently. This book will help companies worldwide to adopt and incorporate machine learning into their processes and products to improve their competitiveness. The book delves into this engineering discipline's aspects and components and explores best practices and case studies. Adopting MLOps requires a sound strategy, which the book's early chapters cover in detail. The book also discusses the infrastructure and best practices of Feature Engineering, Model Training, Model Serving, and Machine Learning Observability. Ray, the open source project that provides a unified framework and libraries to scale machine learning workload and the Python application, is introduced, and you will see how it fits into the MLOps technical stack. This book is intended for machine learning practitioners, such as machine learning engineers, and data scientists, who wish to help their company by adopting, building maps, and practicing MLOps. What You'll Learn Gain an understanding of the MLOps discipline Know the MLOps technical stack and its components Get familiar with the MLOps adoption strategy Understand feature engineering Who This Book Is For Machine learning practitioners, data scientists, and software engineers who are focusing on building machine learning systems and infrastructure to bring ML models to production

Mastering Knowledge Management Using Microsoft Technologies: Secrets to Leveraging Microsoft 365 and Becoming a Knowledge Management Guru

by Tori Reddy Dodla

For companies and individuals already using Microsoft365 and other Microsoft technologies, this book is designed to reveal how to fully utilize these platforms for effective Knowledge Management without needing to rely on additional third-party tools. It addresses a common issue where organizations find themselves with overlapping technology capabilities for managing knowledge. This situation arises because many companies are not fully aware of the capabilities they already possess within their existing Microsoft tools. Knowledge management firms capitalize on this gap by offering white-labeled, branded applications with user-friendly interfaces, selling them to companies that could achieve the same results with what they already own, if only they knew how to use them properly. By mastering the use of Microsoft technologies for Knowledge Management, organizations can save significant amounts of money that would otherwise be spent on unnecessary external solutions. Whether your objective is to optimize Knowledge Management processes or align these tools with your organization's business processes, this book is designed to serve as a valuable resource, offering practical guidance and strategies to empower your endeavors. By the end of this book, readers will be equipped with the knowledge and skills necessary to make informed decisions regarding the utilization of Microsoft technologies for Knowledge Management and organizational design. What You Will Learn The components of a Microsoft Knowledge Base How PowerPlatfom can support Knowledge Management activities How Microsoft tools fit into the Knowledge Management Landscape How to integrate AI using Microsoft Co-Pilot Who This Book Is For Chief Technology Officers, Chief Information Officers, Chief Knowledge Officers, Chief Digital Officers, Directors of Knowledge Management, Knowledge Managers, SharePoint Administrators, Digital Transformation Consultants

Algorithmic Trading Systems and Strategies: Design, Build, and Maintain an Effective Strategy Search Mechanism

by Viktoria Dolzhenko

Design and develop a complex trading system from idea to operation. Old approaches were based on manually searching for strategy ideas. This book shows you how to create a system that will generate, optimize, and launch profitable strategies into a fully automatic mode. Imagine a system that only requires access to the Internet and electricity from a trader. This book describes the architecture and features of such a system and provides recommendations for further development. Most books cover only the implementation stage and overlook the design and maintenance of these systems. Here, you’ll walk through the entire process of creating a complex, scalable and easily supported system. For example, you’ll design an application based on microservice architecture and learn about development environments. You’ll also examine the advantages of horizontal scaling in the context of creating trading systems. Along the way, you’ll set up Kubernetes, connect the monitoring system. and understand the intricacies of continuous integration and continuous delivery. Testing and identifying only dozens of strategies is a thing of the past. Algorithmic Trading Systems and Strategies: A New Approach shows you how to analyze thousands in the same amount of time.

Machine Learning For Network Traffic and Video Quality Analysis: Develop and Deploy Applications Using JavaScript and Node.js

by Tulsi Pawan Fowdur Lavesh Babooram

This book offers both theoretical insights and hands-on experience in understanding and building machine learning-based Network Traffic Monitoring and Analysis (NTMA) and Video Quality Assessment (VQA) applications using JavaScript. JavaScript provides the flexibility to deploy these applications across various devices and web browsers. The book begins by delving into NTMA, explaining fundamental concepts and providing an overview of existing applications and research within this domain. It also goes into the essentials of VQA and offers a survey of the latest developments in VQA algorithms. The book includes a thorough examination of machine learning algorithms that find application in both NTMA and VQA, with a specific emphasis on classification and prediction algorithms such as the Multi-Layer Perceptron and Support Vector Machine. The book also explores the software architecture of the NTMA client-server application. This architecture is meticulously developed using HTML, CSS, Node.js, and JavaScript. Practical aspects of developing the Video Quality Assessment (VQA) model using JavaScript and Java are presented. Lastly, the book provides detailed guidance on implementing a complete system model that seamlessly merges NTMA and VQA into a unified web application, all built upon a client-server paradigm. By the end of the book, you will understand NTMA and VQA concepts and will be able to apply machine learning to both domains and develop and deploy your own NTMA and VQA applications using JavaScript and Node.js. What You Will Learn What are the fundamental concepts, existing applications, and research on NTMA? What are the existing software and current research trends in VQA? Which machine learning algorithms are used in NTMA and VQA? How do you develop NTMA and VQA web-based applications using JavaScript, HTML, and Node.js? Who This Book Is For Software professionals and machine learning engineers involved in the fields of networking and telecommunications

Brain Rush: How to Invest and Compete in the Real World of Generative AI

by Peter Cohan

After decades of false starts, artificial intelligence (AI) is entering the mainstream of society. That is largely due to the rapid adoption of ChatGPT, a service that responds to almost any natural language question with cogent paragraphs. ChatGPT is the leading example of generative AI -- technology that creates original text, images, video and computer code based on uncovering patterns in training data. The book will explain how generative AI works and how much economic value it could create and will map out the industry value network. For each value network stage, the book will define the industry, estimate its size, growth rate, and profit potential, identify the most successful participants, and explain how they have achieved their success and where they will compete in the future. The book will conclude with a section on what investors and business leaders should do to make an informed decision on where to place their bets.What You Will LearnInsights on how best to assemble the resources – whether by hiring a consultant or bringing on board a generative AI expert -- to build, train, and operate company specific generative AI applicationsHow management can brainstorm, evaluate and execute the right opportunitiesConcepts and processes to enable investors to place bets with the highest risk-adjusted returnsWho This Book is ForBusiness and enterprises seeking to get value from generative AI, current or potential suppliers of technology and services to companies that build generative AI, and venture capitalists and public equity investors seeking to make profitable bets on generative AI companies

Getting Started with Pester 5: A Beginner's Guide

by Owen Heaume

Embark on a transformative journey into the world of Pester and elevate your PowerShell scripting to new heights of robustness, reliability, and efficiency. This comprehensive beginner's guide provides a hands-on approach to PowerShell testing using Pester, empowering you to enhance your code quality with confidence.The book starts with an introduction to Pester, the powerful testing and mocking framework for PowerShell. You'll gain a solid foundation by exploring Pester's fundamental building blocks. The book guides you through the phases of Pester, helping you write your initial Pester code. You will dive into topics such as tags, assertions with Should and parameter filters, and you will explore advanced techniques such as Test Drive and Test Registry.You will discover the art of mocking in Pester and master its advanced testing methodologies. You will gain insights into working without installed modules and seamlessly integrating Pester with Azure DevOps Pipeline for a streamlined testing process.After reading this book, you will have the knowledge and skills to initiate your own exploration into PowerShell testing with Pester. You will transform your scripts into reliable powerhouses, ensuring the resilience and quality of your PowerShell code.What Will You LearnBuilding blocks and phases of PesterWriting effective Pester testsAssertions, mocking, and advanced testing techniquesIntegration with Azure DevOpsTags, code coverageWho This Book Is ForPowerShell scripters and Pester Framework beginners

Java Testing with Selenium: A Comprehensive Syntax Guide for Automation

by Sujay Raghavendra

Master the art of automated testing using Selenium with Java in this comprehensive guide. Whether you're a beginner or an experienced tester, the book equips you with the knowledge and techniques to build robust and maintainable test suites, ensuring the quality and reliability of your web applications. This book starts introducing the basics of automated testing and the importance of Selenium. It then covers the setup and configuration of the Selenium WebDriver in Java, providing a solid foundation for your testing environment. You'll learn essential aspects of Selenium testing in Java, including working with different browsers, locating web elements using locators, and performing actions on them. From there, you’ll explore how to handle dynamic web pages and effective wait mechanisms and verifications to ensure accurate and reliable test results. The book also guides you in setting up Selenium in Java for continuous integration and emphasizes best practices for test codeorganization and maintainability, such as the Page Object Model (POM) and structuring test suites effectively. By the end, you’ll have the expertise to address advanced scenarios, such as working with iframes, and know how TestNG enhances Selenium automation, enabling structured tests, data-driven insights, and swift parallel executions. Throughout the book, you'll benefit from real-world examples and practical exercises that reinforce the concepts. The clear explanations and step-by-step guidance make it easy to follow along and apply the knowledge to your own testing projects. What You Will Learn Understand the fundamentals of automated testing and the role of Selenium in web application testing Set up the Selenium WebDriver in Java and configure the testing environment Work with different web browsers and their drivers to perform cross-browser testing Identify and locate web elements using various locators, such as IDs, class names, CSS selectors, and XPath expressions Perform actions on web elements, such as clicking buttons, entering text, submitting forms, and navigating through web pages Handle dynamic pages by implementing effective wait mechanisms, including implicit waits, explicit waits, and fluent waits Verify and assert expected conditions and outcomes using assertions and verification techniques provided by Selenium in Java Apply best practices for test code organization and maintainability, including using the Page Object Model (POM) design pattern Handle advanced scenarios, such as working with iframes, and elevating Selenium automation through TestNG’s structured frameworks, data utilization, and parallel processing Who This Book For Software testers, quality assurance professionals, and developers interested in mastering automated testing with Selenium and Java. Suitable for various experience levels. Offers practical insights and techniques to automate web application testing accurately and reliably. Benefits testers, developers, and individuals familiar with Java and web testing, empowering them to write robust, maintainable test code and integrate Selenium seamlessly into their workflows.

The Art of Immutable Architecture: Theory and Practice of Data Management in Distributed Systems

by Michael L. Perry

This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable architecture to your tools.Most software components focus on the state of objects. They store the current state of a row in a relational database. They track changes to state over time, making several basic assumptions: there is a single latest version of each object, the state of an object changes sequentially, and a system of record exists.This is a challenge when it comes to building distributed systems. Whether dealing with autonomous microservices or disconnected mobile apps, many of the problems we try to solve come down to synchronizing an ever-changing state between isolated components. Distributed systems would be a lot easier to build if objects could not change.After reading The Art of Immutable Architecture, you will come away with an understanding of the benefits of using immutable objects in your own distributed systems. You will learn a set of rules for identifying and exchanging immutable objects, and see a collection of useful theorems that emerges and ensures that the distributed systems you build are eventually consistent. Using patterns, you will find where the truth converges, see how changes are associative, rather than sequential, and come to feel comfortable understanding that there is no longer a single source of truth. Practical hands-on examples reinforce how to build software using the described patterns, techniques, and tools. By the end of the book, you will possess the language and resources needed to analyze and construct distributed systems with confidence. The assumptions of the past were sufficient for building single-user, single-computer systems. But aswe expand to multiple devices, shared experiences, and cloud computing, they work against us. It is time for a new set of assumptions. Start with immutable objects, and build better distributed systems.What You Will LearnEvaluate a distributed system from the perspective of immutable objects Recognize the problems in existing designs, and make small modifications to correct them Start a new system from scratch, applying patternsApply the principles of immutable architecture to your tools, including SQL databases, message queues, and the network protocols that you already use Discover new tools that natively apply these principles Who This Book Is ForSoftware architects and senior developers. It contains examples in SQL and languages such as JavaScript and C#. Past experience with distributed computing, data modeling, or business analysis is helpful.

Software Development, Design, and Coding: With Patterns, Debugging, Unit Testing, and Refactoring

by John F. Dooley Vera A. Kazakova

Learn the principles of good software design and then turn those principles into great code. This book introduces you to software engineering — from the application of engineering principles to the development of software. You'll see how to run a software development project, examine the different phases of a project, and learn how to design and implement programs that solve specific problems. This book is also about code construction — how to write great programs and make them work. This new third edition is revamped to reflect significant changes in the software development landscape with updated design and coding examples and figures. Extreme programming takes a backseat, making way for expanded coverage of the most crucial agile methodologies today: Scrum, Lean Software Development, Kanban, and Dark Scrum. Agile principles are revised to explore further functionalities of requirement gathering. The authors venture beyond imperative and object-oriented languages, exploring the realm of scripting languages in an expanded chapter on Code Construction. The Project Management Essentials chapter has been revamped and expanded to incorporate "SoftAware Development” to discuss the crucial interpersonal nature of joint software creation. Whether you're new to programming or have written hundreds of applications, in this book you'll re-examine what you already do, and you'll investigate ways to improve. Using the Java language, you'll look deeply into coding standards, debugging, unit testing, modularity, and other characteristics of good programs. You Will Learn Modern agile methodologies How to work on and with development teams How to leverage the capabilities of modern computer systems with parallel programming How to work with design patterns to exploit application development best practices How to use modern tools for development, collaboration, and source code controls Who This Book Is For Early career software developers, or upper-level students in software engineering courses

CodeMosaic: Learn AI-Driven Development and Modern Best Practices for Enterprise

by Arpit Dwivedi

This book is a comprehensive guide for those navigating through the complexities of enterprise software development. For fresh graduates, transitioning from college projects to real-world applications can be overwhelming. This book acts as a roadmap, helping you bridge the gap to become industry-ready. It's like an intensive internship in book form, equipping readers with the skills and knowledge needed for modern tech roles. But it's not just for newcomers. Even experienced developers can get caught up in old routines and miss out on new tools and techniques. With the rise of AI and automation tools like ChatGPT and Copilot, the development landscape is rapidly changing. The core of the book revolves around practical application. Using .NET, Angular, and other Microsoft technologies as foundational pillars, you’ll embark on a hands-on journey. From understanding the basics to designing and deploying a full-stack web application, CodeMosaic offers a holistic learning experience. By the end, you won't just be a developer; you'll be well-equipped to tackle the challenges of today's digital world. What You'll Learn Review Agile methodologies and Azure DevOps for streamlined project management. Gain a thorough understanding of smart development from design to deployment. Master software development with .NET and Angular, along with effective version control using Git. Enhance your coding and design skills using GitHub Copilot, GPT technologies, and AI-driven prompt engineering. Who This Book Is For Experienced developers looking for new tools and techniques, and recent graduates, transitioning from college projects to real-world applications.

PHP by Example: A Practical Guide to Creating Web Applications with PHP

by Alex Vasilev

Learn to create web applications in PHP with minimal previous experience. This book is a practical guide to using PHP for web development. Loaded with examples and step-by-step instructions, each chapter is dedicated to a specific area or function. You’ll first review the main principles of PHP and what is needed to program and develop in it. You’ll then study variables, data types, control statements, arrays, and functions, all critical for creating efficient PHP programs. The book then moves on to object-oriented programming (OOP) and how to implement those principles in PHP, as well as inheritance, interfaces, testing, error handling, and exceptions. By the end of PHP by Example, you will have the knowledge and confidence to implement PHP for your web projects both large and small. What You’ll Learn Understand PHP from the ground up Create scripts and implement them in real-world projects Work with a broad toolkit of ready-made exercises and solutions Investigate the main constructions of the PHP

Google Cloud Platform: Learn and Apply Security Design Concepts to Ace the Exam (Certification Study Companion Series)

by Dario Cabianca

Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios. Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads’ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate. By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform. Bonus Material: IAM deny policies What You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is For Software engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.

Windows Forensics: Understand Analysis Techniques for Your Windows

by William Butler Chuck Easttom Jessica Phelan Ramya Sai Bhagavatula Sean Steuber Karely Rodriguez Victoria Indy Balkissoon Zehra Naseer

This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.What Will You LearnUnderstand Windows architectureRecover deleted files from Windows and the recycle binUse volatility and PassMark volatility workbenchUtilize Windows PowerShell scripting for forensic applicationsWho This Book Is ForWindows administrators, forensics practitioners, and those wanting to enter the field of digital forensics

The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team

by Michael Butler Jacob G. Oakley

There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that.The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you’ll learn How to handle and ongoing develop client relationships in a high end industryTeam management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.How to identify, understand, and over-deliver on client expectations.How to staff and develop talent within the team.Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.

Introduction to Python Network Automation Volume I - Laying the Groundwork: The Essential Skills for Growth

by Brendan Choi

Welcome to Introduction to Python Network Automation Volume I: Laying the Groundwork. In this first part of our comprehensive guide, you'll embark on a transformative journey into the world of network automation. Whether you're new to the IT field or seeking to strengthen your existing skills, this book serves as your roadmap to mastering the foundational skills essential for success in network automation. You'll begin your exploration by delving into the fundamentals of Python network automation, laying a solid foundation for your learning journey. Equipped with essential Python skills, you'll leverage them for network administration tasks, particularly on the Windows platform. Reinforce your understanding through targeted exercises designed to enhance your proficiency and navigate the complexities of VMware Workstation as you master virtualization techniques crucial for setting up your network automation environment. You’ll then venture into Linux fundamentals, learning to set up and configure server environments tailored for network automation tasks while gaining a deep understanding of file systems and TCP/IP services in Linux. Explore the power of regular expressions as you streamline network automation tasks with precision and efficiency. Discover GNS3, a vital tool for network emulation, enabling you to test and validate network designs and put your skills to the test by tackling real-world network challenges in a comprehensive lab scenario. This book provides the essential knowledge and practical experience needed to thrive in the rapidly evolving field of network automation. Whether you're new to network automation or seeking to strengthen your existing skills, this book will unlock the vast potential of network automation and empower you to excel in this exciting field. What You'll Learn Learn Python fundamentals and effective network automation strategies. Use Python for various network administration tasks, improving efficiency. Understand Linux basics and IP service installation techniques. Apply regular expressions in Python for data processing. Create a network automation lab with VMware Workstation for hands-on practice. Who This Book Is For IT engineers and developers, network managers and students, who would like to learn network automation using Python.

CompTIA Linux+ Certification Companion: Hands-on Preparation to Master Linux Administration (Certification Study Companion Series)

by Ahmed F. Sheikh

The CompTIA Linux+ Certification" book – the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification. Whether you're a beginner or an experienced professional, this comprehensive resource is designed to equip you with the knowledge and skills needed to excel in the world of Linux.With its comprehensive coverage, this book delves into essential Linux concepts, commands, and techniques, providing you with a complete reference guide. You'll review how to customize and navigate the shell environment, write powerful scripts, configure user interfaces, perform administrative tasks, configure system services, establish network connections, and secure your system. No stone is left unturned in this in-depth exploration of Linux administration.What sets this book apart is its practical approach. Real-world scenarios and practical applications take center stage, ensuring that you not only understand the theory but also know how to apply it effectively.Troubleshooting common issues becomes second nature as you gain the skills to diagnose and resolve system problems with ease. You'll discover industry best practices and standards, enabling you to optimize systems, implement robust security measures, and adhere to compliance regulations.What You Will Learn:Linux operating systems, including installation, configuration, and management of Linux-based servers and systems. Essential administrative tasks, such as user and group management, file system administration, network configuration, and security implementation.Insights into troubleshooting common Linux issues, enabling readers to diagnose and resolve system problems effectively. Practical techniques for identifying and addressing system errors, performance bottlenecks, network connectivity issues, and other challenges that may arise in a Linux environment.Industry best practices and standards in Linux administration. System optimization, backup and recovery strategies, security practices, and adherence to compliance regulations.Who This Book is for:Administrators: This book serves as an excellent resource for individuals who are new to Linux administration and wish to develop a strong foundation in this field. They may have basic knowledge of Linux concepts or come from related IT roles and seek to expand their skills to include Linux system management.IT Professionals Transitioning to Linux: Professionals already working in the IT industry, such as system administrators or network engineers, who want to enhance their skill set and broaden their knowledge by incorporating Linux administration into their repertoire. They may have experience with other operating systems and are seeking to acquire Linux-specific skills.Experienced Linux Administrators: Seasoned Linux administrators can benefit from this book as well. It serves as a comprehensive reference guide, offering advanced topics, best practices, and insights into the latest trends and developments in the Linux ecosystem. It can be a valuable resource for expanding their expertise and staying up-to-date with industry standards.Secondary or tertiary audiences may include IT managers, system architects, or developers who work closely with Linux systems and wish to gain a deeper understanding of Linux administration. Additionally, students pursuing computer science or IT-related degrees may find the book beneficial for their coursework and career advancement.

Visual Analytics for Dashboards: A Step-by-Step Guide to Principles and Practical Techniques

by Arshad Khan

This book covers the key principles, best practices, and practical techniques for designing and implementing visually compelling dashboards. It explores the various stages of the dashboard development process, from understanding user needs and defining goals, to selecting appropriate visual encodings, designing effective layouts, and employing interactive elements. It also addresses the critical aspect of data storytelling, examining how narratives and context can be woven into dashboards to deliver impactful insights and engage audiences. Visual Analytics for Dashboards is designed to cater to a wide range of readers, from beginners looking to grasp the fundamentals of visual analytics, to seasoned professionals seeking to enhance their dashboard design skills. For different types of readers, such as a data analyst, BI professional, data scientist, or simply someone interested in data visualization, this book aims to equip them with the knowledge and tools necessary to create impactful dashboards. What you’ll learn The principles of data visualization How to create effective dashboards Meet all the requirements for visual analytics/data visualization/dashboard courses Deepen understanding of data presentation and analysis How to use different kinds of tools for data analysis, such as scorecards and key performance indicators Who This Book Is For Business analysts, data analysts, BI professionals, end-users, executives, developers, as well as students in dashboards, data visualizations, and visual analytics courses.

Grand Teton Stampede

by C. R. Fulton

“STAMPEDE!” Isaiah yells as the herd heads straight at his and Ethan’s tent… Twelve-year-old Isaiah Rawlings wished for only one thing this summer, a camping trip outside of Kentucky. I’m so tired of camping in my backyard, he groaned. Isaiah pleads with his parents to reconsider their usual summer trip to dusty old museums and big cities. When his dad unexpectedly announces a trip to Grand Teton National Park, Isaiah is ecstatic! On the second night of camping, He wakes to a thunderous noise that grows louder and louder. The ground begins to tremble. Earthquake?! Isaiah scrambles from his tent… When Isaiah, his cousin Ethan, and sister Sadie investigate the next morning, tracks lead them back to a broken fence. As they scan the surrounding area, something seems off…Why? More than one set of tracks lead into the park. Was this stampede accidental or is there more to the story?

Refine Search

Showing 76 through 100 of 11,697 results