Saved in:
Other Authors: | |
---|---|
Format: | Electronic Video |
Language: | English |
Published: |
[Place of publication not identified]
Pearson
[2024]
|
Edition: | [First edition]. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780135402696/?ar |
Summary: | AI-Enabled Programming, Networking, and Cybersecurity is for programmers, developers, networking, or security professionals looking to use AI tools. AI-powered tools like ChatGPT, GitHub Copilot, Cursor, LangChain, and other AI models are changing the landscape of cybersecurity, programming, networking, and beyond. This course covers the introduction to the AI models, focusing on ChatGPT for cybersecurity education, GitHub Copilot and Cursor for programming support, and other AI models that have proven useful for learning and work enhancements, and explores the practical applications of these tools, emphasizing how to ask effective questions, interpret answers, and engage in deeper learning. |
Item Description: | Online resource; title from title details screen (O'Reilly, viewed October 10, 2024) |
Physical Description: | 1 Online-Ressource (1 video file (2 hr., 40 min.)) sound, color. |
ISBN: | 9780135402696 0135402697 |
Staff View
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-109654692 | ||
003 | DE-627-1 | ||
005 | 20241107103332.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 241107s2024 xx ||| |o o ||eng c | ||
020 | |a 9780135402696 |c electronic video |9 978-0-13-540269-6 | ||
020 | |a 0135402697 |c electronic video |9 0-13-540269-7 | ||
035 | |a (DE-627-1)109654692 | ||
035 | |a (DE-599)KEP109654692 | ||
035 | |a (ORHE)9780135402696 | ||
035 | |a (DE-627-1)109654692 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 006.3 |2 23/eng/20241010 | |
245 | 0 | 0 | |a AI-enabled programming, networking, and cybersecurity |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Pearson |c [2024] | |
300 | |a 1 Online-Ressource (1 video file (2 hr., 40 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed October 10, 2024) | ||
520 | |a AI-Enabled Programming, Networking, and Cybersecurity is for programmers, developers, networking, or security professionals looking to use AI tools. AI-powered tools like ChatGPT, GitHub Copilot, Cursor, LangChain, and other AI models are changing the landscape of cybersecurity, programming, networking, and beyond. This course covers the introduction to the AI models, focusing on ChatGPT for cybersecurity education, GitHub Copilot and Cursor for programming support, and other AI models that have proven useful for learning and work enhancements, and explores the practical applications of these tools, emphasizing how to ask effective questions, interpret answers, and engage in deeper learning. | ||
650 | 0 | |a Artificial intelligence | |
650 | 0 | |a Computer programming | |
650 | 0 | |a Computer networks | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Intelligence artificielle | |
650 | 4 | |a Programmation (Informatique) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a artificial intelligence | |
650 | 4 | |a computer programming | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Santos, Omar |e MitwirkendeR |4 ctb | |
710 | 2 | |a Pearson (Firm), |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780135402696/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-109654692 |
---|---|
_version_ | 1835903242661265408 |
adam_text | |
any_adam_object | |
author2 | Santos, Omar |
author2_role | ctb |
author2_variant | o s os |
author_facet | Santos, Omar |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)109654692 (DE-599)KEP109654692 (ORHE)9780135402696 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02775ngm a22005892c 4500</leader><controlfield tag="001">ZDB-30-ORH-109654692</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241107103332.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241107s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780135402696</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-0-13-540269-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0135402697</subfield><subfield code="c">electronic video</subfield><subfield code="9">0-13-540269-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)109654692</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP109654692</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780135402696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)109654692</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23/eng/20241010</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">AI-enabled programming, networking, and cybersecurity</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (2 hr., 40 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed October 10, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">AI-Enabled Programming, Networking, and Cybersecurity is for programmers, developers, networking, or security professionals looking to use AI tools. AI-powered tools like ChatGPT, GitHub Copilot, Cursor, LangChain, and other AI models are changing the landscape of cybersecurity, programming, networking, and beyond. This course covers the introduction to the AI models, focusing on ChatGPT for cybersecurity education, GitHub Copilot and Cursor for programming support, and other AI models that have proven useful for learning and work enhancements, and explores the practical applications of these tools, emphasizing how to ask effective questions, interpret answers, and engage in deeper learning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programmation (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Santos, Omar</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Pearson (Firm),</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780135402696/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-109654692 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:16:09Z |
institution | BVB |
isbn | 9780135402696 0135402697 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (2 hr., 40 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Pearson |
record_format | marc |
spelling | AI-enabled programming, networking, and cybersecurity [First edition]. [Place of publication not identified] Pearson [2024] 1 Online-Ressource (1 video file (2 hr., 40 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed October 10, 2024) AI-Enabled Programming, Networking, and Cybersecurity is for programmers, developers, networking, or security professionals looking to use AI tools. AI-powered tools like ChatGPT, GitHub Copilot, Cursor, LangChain, and other AI models are changing the landscape of cybersecurity, programming, networking, and beyond. This course covers the introduction to the AI models, focusing on ChatGPT for cybersecurity education, GitHub Copilot and Cursor for programming support, and other AI models that have proven useful for learning and work enhancements, and explores the practical applications of these tools, emphasizing how to ask effective questions, interpret answers, and engage in deeper learning. Artificial intelligence Computer programming Computer networks Computer security Computer networks Security measures Intelligence artificielle Programmation (Informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures artificial intelligence computer programming Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Santos, Omar MitwirkendeR ctb Pearson (Firm), Verlag pbl |
spellingShingle | AI-enabled programming, networking, and cybersecurity Artificial intelligence Computer programming Computer networks Computer security Computer networks Security measures Intelligence artificielle Programmation (Informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures artificial intelligence computer programming Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | AI-enabled programming, networking, and cybersecurity |
title_auth | AI-enabled programming, networking, and cybersecurity |
title_exact_search | AI-enabled programming, networking, and cybersecurity |
title_full | AI-enabled programming, networking, and cybersecurity |
title_fullStr | AI-enabled programming, networking, and cybersecurity |
title_full_unstemmed | AI-enabled programming, networking, and cybersecurity |
title_short | AI-enabled programming, networking, and cybersecurity |
title_sort | ai enabled programming networking and cybersecurity |
topic | Artificial intelligence Computer programming Computer networks Computer security Computer networks Security measures Intelligence artificielle Programmation (Informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures artificial intelligence computer programming Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Artificial intelligence Computer programming Computer networks Computer security Computer networks Security measures Intelligence artificielle Programmation (Informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures artificial intelligence computer programming Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT santosomar aienabledprogrammingnetworkingandcybersecurity AT pearsonfirm aienabledprogrammingnetworkingandcybersecurity |