Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,419
result(s) for
"Informatik."
Sort by:
The Cambridge handbook of computing education research
\"This handbook describes the extent and shape of Computing Education research today. Over 50 leading researchers from academia and industry (including Google and Microsoft) have contributed chapters that together define and expand the evidence base. The foundational chapters set the field in context, articulate expertise from key disciplines, and form a practical guide for new researchers. They address what can be learned empirically, methodologically and theoretically from each area. The topic chapters explore issues that are of current interest, why they matter, and what is already known. They include discussion of motivational context, implications for practice, and open questions which might suggest future research\"-- Provided by publisher.
Hands-On Spring Security 5 for Reactive Applications
by
John, Tomcy
in
Application software-Development
,
Computer security
,
COMPUTERS / Programming / General
2018,2024
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
CCNA Cyber Ops SECOPS - Certification Guide 210-255
2019,2024
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
Hands-On Security in DevOps
by
Hsu, Tony Hsiang-Chih
in
Computer networks-Access control
,
Computer networks-Security measures
,
COMPUTERS / Computer Science
2018,2024
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.
Hands on Hacking
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data.
Digital competence and digital literacy in higher education research: Systematic review of concept use
by
Hashemi, Sylvana Sofkova
,
Spante, Maria
,
Algers, Anne
in
Arbetsintegrerat lärande
,
Content Analysis
,
Definitions
2018
Digital competence and digital literacy are concepts that are increasingly used in public discourse. However, how the concepts are used and how they are defined remains unclear. This paper presents a systematic review of research where these concepts are used in higher education research. The aim is to establish an understanding of referencing strategy to digital literacy and digital competence over time, disciplines, countries, methods and level of analysis. Three databases were used in the systematic literature review: Web of Science, Scopus and Education Resources Information Centre. We delimited the search to title, abstract and keywords in the databases. Inclusion criteria were peer-reviewed publications written in English. Initially 107 publications between 1997 and 2017 were found, with 28 addressing digital competence and 79 digital literacy. Our review demonstrates that there is a range of definitions used in higher education research. They vary depending on if the concepts are defined by policy, research or both and whether they focus on technical skills or social practices. This review indicates directions for further research in higher education i) do more research based on critical perspectives to avoid commonsensical use of the concepts, ii) take the development of definitions of these concepts seriously iii) avoid cross-referencing incompatibilities and finally iv) engage in critical investigations regarding the legitimacy of policy over research in the domain of higher education research.
Journal Article
Knowledge, power, and patients
by
Salmi, Liz
,
Hägglund, Maria
,
DesRoches, Catherine
in
Medical Informatics
,
Medicinsk informatik
2021
Journal Article
Securing the cloud : cloud computer security techniques and tactics
by
Meine, Bill
,
Winkler, J. R. (Joachim R.)
in
Cloud computing
,
Computer networks
,
Computer networks -- Security measures
2011
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Named The 2011 Best Identity Management Book by InfoSec ReviewsProvides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power, and storage