Showing 2425–2436 of 4482 results

Learning RxJS Operators by Example Playbook
The strength of RxJS is its over 100 operators; they provide the power. Learning those operators was hard, until now. This course will teach you every single operator, with examples and marble diagrams, all in framework-agnostic vanilla JavaScript.

Legal and Ethical Considerations for Digital Forensics
Legally sound digital forensics investigations are critical in today’s world of cybercrime. This course will give you the critical knowledge you need to understand legal and ethical concepts pertaining to digital forensics investigations.

Legal, Risk, and Compliance for CCSP®
Adhering to legal requirements while consuming cloud services can be a challenge as requirements differ with geography. This course will teach you legal, risk, and compliance frameworks needed for the CCSP® exam.

Less 4: Getting Started
Developers might not like CSS, but there is a way to make it work more like code. With this simple toolkit, you can use programmatic structures like variables, reusable classes, and computation to make your CSS even better.

Lessons from Incident Management and Postmortems at Atlassian
How do you run incidents and postmortems at a company with thousands of engineers spread across the globe? Jim Severino shares what did and didn't work for Atlassian.

Let Devs Be Devs: Abstracting Compliance and Reliability to Accelerate JPMCs Cloud Deployments
In this session, Rahul Arya will share how they built a platform to abstract away compliance, make reliability with Chaos Engineering self-serve, and enable developers to ship code faster than ever.

Level Up: Start Contributing to Open Source
Level up: Start contributing to open source with Soumya Kalra at the 2019 Women in Analytics Conference.

Leverage PowerShell Tools for Pen Testing
This course will teach you to leverage one of the most powerful built-in tools, PowerShell, for penetration testing.

Leveraging Advanced Features on the Google Cloud Kubernetes Engine
This course specifically deals with some advanced, real-world use-cases involving the use of GKE including rolling updates and rollbacks, managing cluster security and networking, and implementing CI/CD pipelines with Jenkins and the GKE.

Leveraging Data in Iterative Product Design
Explore how to use data insights to inform and improve iterative product design processes.

Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API
This course focuses on the design and implementation of security scanning, protection against Distributed Denial of Service (DDoS) attacks and security auditing. The course also covers the use of the Data Loss Prevention API in protecting sensitive data.

Leveraging Google Cloud Firestore for Realtime Database Solutions
Cloud Firestore is a cloud-hosted NoSQL, document-oriented database where documents are made up of fields and stored in collections. Firestore is a fully-managed service which allows realtime updates to keep data in sync across multiple clients.