Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,419 result(s) for "Informatik."
Sort by:
The Cambridge handbook of computing education research
\"This handbook describes the extent and shape of Computing Education research today. Over 50 leading researchers from academia and industry (including Google and Microsoft) have contributed chapters that together define and expand the evidence base. The foundational chapters set the field in context, articulate expertise from key disciplines, and form a practical guide for new researchers. They address what can be learned empirically, methodologically and theoretically from each area. The topic chapters explore issues that are of current interest, why they matter, and what is already known. They include discussion of motivational context, implications for practice, and open questions which might suggest future research\"-- Provided by publisher.
Hands-On Spring Security 5 for Reactive Applications
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
CCNA Cyber Ops SECOPS - Certification Guide 210-255
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
Hands-On Security in DevOps
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.
Hands on Hacking
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data.
Digital competence and digital literacy in higher education research: Systematic review of concept use
Digital competence and digital literacy are concepts that are increasingly used in public discourse. However, how the concepts are used and how they are defined remains unclear. This paper presents a systematic review of research where these concepts are used in higher education research. The aim is to establish an understanding of referencing strategy to digital literacy and digital competence over time, disciplines, countries, methods and level of analysis. Three databases were used in the systematic literature review: Web of Science, Scopus and Education Resources Information Centre. We delimited the search to title, abstract and keywords in the databases. Inclusion criteria were peer-reviewed publications written in English. Initially 107 publications between 1997 and 2017 were found, with 28 addressing digital competence and 79 digital literacy. Our review demonstrates that there is a range of definitions used in higher education research. They vary depending on if the concepts are defined by policy, research or both and whether they focus on technical skills or social practices. This review indicates directions for further research in higher education i) do more research based on critical perspectives to avoid commonsensical use of the concepts, ii) take the development of definitions of these concepts seriously iii) avoid cross-referencing incompatibilities and finally iv) engage in critical investigations regarding the legitimacy of policy over research in the domain of higher education research.
Securing the cloud : cloud computer security techniques and tactics
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Named The 2011 Best Identity Management Book by InfoSec ReviewsProvides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power, and storage