Thursday, May 22, 2025 from 2:00 pm – 3:00 pm In the Project Leadership Webinar Series, resources and strategies for facilitating an Open Educational Resource (OER) project will be shared. Part 4 explores iterative development through authoring, adapting, and refining OER content. Participants will engage with best practices for inclusive design, legal and accessibility compliance, …
Author: Amy Liao
This book covers the basics of MySQL. It includes two sample databases that you can load into your local MySQL instance and try the examples for yourself. In a future edition, the following items will be added. – Information on SQL database design – An explanation of the three types of table relationships and when …
Learning MySQL By Example (Miles, 2021) (CC BY-NC-ND)Read More »
This is version 4.0 of their widely referenced guidance document, which is also used to prepare for the Certificate of Cloud Security Knowledge (CCSK). It reflects industry best practices as of that year.
This open access book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, big …
This book describes the simplified architecture of an IoT network from the core functional perspective and then presents step-by-step procedures to establish a connection between the IoT device and platform. It practically shows how to connect a cellular IoT module to the Microsoft Azure IoT Hub using the LTE-M technology.
Digital technologies old and new are not objects that can be packed inside a box. They are a seamless, indivisible combination of people, organizations, policies, economies, histories, cultures, knowledge, and material things that are continuously shaped and reshaped. Every one of us innovates-in-use our everyday technologies, we just do not always know it. Not only …
The phrase “Internet of Things” (IoT) alludes to the billions of physical devices connected to the Internet in order to exchange raw data and analyze the information. This book introduces the IoT use cases and technologies. It uses practical examples to demonstrate the effect of IoT and its potential to change our world, and it …
IoT Use Cases and Technologies (Dian and Vahidnia, 2020) (CC BY-NC-SA 4.0)Read More »
Structured to align with the CompTIA Security+ SY0-601 certification objectives, the textbook serves as both an academic resource and a certification study guide. Its modular design allows for flexible integration into various course structures, making it suitable for semester-long curricula or targeted training programs.
Digital evidence features in just about every part of our personal and business lives. Legal and business decisions hinge on having timely data about what people have actually done. This free course, Digital forensics, is an introduction to computer forensics and investigation, and provides a taster in understanding how to conduct investigations to correctly gather, …
Digital forensics (Sommer and Price, 2019) (CC BY-NC-SA 4.0)Read More »
A collection of study materials and books on ethical hacking and cybersecurity.