Сборник ЛЕКСИЧЕСКИХ заданий по ВСЕМ разделам экзамена и по самым разным темам кодификатора — идеальный помощник для учителей, готовящих к ЕГЭ.
Сборник содержит задания ЕГЭшного формата, но переработанные с учетом лексического подхода.
Задания сборника обеспечивают отличную рециркуляцию лексики и...
Аудиовизуальная суггестивная программа (сессия) «Скорочтение» предназначена для внедрения в подсознание установок на развитие способности к скорочтению и формирование устойчивых навыков быстрого и качественного восприятия большого объема информации.
Внедрение установок в подсознание проводится...
[Linkedin] OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery, 2023 (Caroline Wong)
It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this course, join instructor and...
[Linkedin] OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures, 2023 (Caroline Wong)
Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep security...
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Security vulnerabilities should be top of mind when it comes to safely accessing web applications within an organization. There’s always something that can go wrong if you’re not careful, but how do you prepare for a...
OWASP Top 10: #3 Injection and #4 Insecure Design
The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, Caroline...
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something could go wrong in any instant. That’s why the Open Web Application Security Project...
Learning the OWASP Top 10
No organization—no matter how large or small—is invulnerable to security breaches. What makes all of these systems, and the software that runs them, susceptible to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the...
React: Building Progressive Web Apps (PWAs)
Single-page applications may be smooth, quick, and effective—but they disappear when the network connection drops. Progressive web apps (PWAs) work offline, enhancing resilience and allowing developers create seamless user experiences that feel like...
React: Securing Applications
You've built an application around React, using it and other libraries to create a smooth and attractive application. Everything works—but does it work securely? Applications that look great and perform well can still be at risk of attack. This course provides...
React: State Management
Choosing the right state management solution can be tricky. Developers need to evaluate a variety of options—each with their own trade-offs—and select the right approach for their needs. In this course, instructor Sravanti Tekumalla helps you navigate this process...
React: Building Large Apps
Learn about some of the most important tools in the React ecosystem that help you simplify development and manage the complexities of state, side effects, structure, and styling. Instructor Shaun Wassell shows how to create a basic React project, and then explains how...
Build a Raspberry Pi Media Server
The most popular use of Raspberry Pi is for custom media servers. All you need is a Pi that has access to your entertainment system and a copy of OSMC, an open-source media center "built for the people, by the people." In these tutorials, Brad Wheeler shows how...
Raspberry Pi: Home Monitoring and Control
Help your home keep up with you—and stay connected to what's going on when you're away—with a custom home monitoring system built with a Raspberry Pi. With some inexpensive hardware and simple web services, you can monitor your house remotely via photo...
Raspberry Pi: GPIO
The Raspberry Pi talks to the outside world through the general-purpose input/output device, known as the GPIO. In this course, instructor Mark Niemann-Ross describes these pins and explains how to use the GPIO to control lights and motors, read data from sensors, and...
Node.js: Testing and Code Quality
Most software engineers would agree that clean code is easier to maintain than messy code, but what exactly does that look like, and how do go about cleaning up messy code? In this course, Jon Peck shows how to measure quality, implement testing, and measure...
React: Authentication
User authentication is a critical part of virtually every website, yet few web developers know all the details behind how it works and how to use it to provide a good user experience. In this course, instructor Shaun Wassell dives into the details behind user...
React: Server-Side Rendering
Server-side rendering lets you optimize your applications to use client or server resources depending on network and device circumstances. Old device on a slow network? Render on the server. New device, fast network? You should probably let the client do the work...
React: Software Architecture
Many React developers have intimate knowledge of the React API itself, but little familiarity with how to create real-world apps on a larger scale while dealing with various stakeholders. The heavy demands on web apps both from a customer and managerial perspective...
React: Design Patterns
If you’ve learned the basics of React and have worked on many React applications, chances are you’ve run into some recurring problems and situations, like creating reusable layouts or working with forms. If you’ve been on the hunt for solutions to common problems, look no...