 |
|
 Critical Testing Processes: Plan, Prepare, Perform, Perfect"Rex Black has done it again!...Critical Testing Processes is a book that all software testers will want to read from cover to cover and then retain for frequent reference."
—From the Foreword by Rick Craig, software test manager, author, lecturer, and consultant
In today's... |  |  Absolute Beginner's Guide to Networking, Fourth Edition Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the... |  |  CCNA for DummiesWhat was that whizzing sound? It was you, passing the CCNA certification exam. After you've covered all of Cisco Systems' exam objectives in CCNA For Dummies, such tasks as following network protocols, routing, and maintaining network security will be new tools to add to your skill set.
First, expect to become familiar with the language of... |
|
|
 IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... |  |  Solaris 9 Security (Networking)Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol... |  |  Tricks of the Microsoft(R) Windows Vista(TM) MastersAll over the world, Windows gurus have been working overtime to uncover the hottest new Windows Vista tips, tricks, and tweaks. Now, J. Peter Bruzzese has collected all their best discoveries in one place: Tricks of the Microsoft® Windows VistaTM Masters! Bruzzese has interviewed top Windows professionals,... |
|
 E-learning Strategies: How to Get Implementation and Delivery Right First TimeAs more than 900f spending on the Internet comes from brick and mortar companies it is these operations that will form the client base for e-learning. This book shows those companies how to get e-learning implementation right first time. Don Morisson explores and explains the whole implementation continuum - strategy, vendor selection,... |  |  Hacking Exposed 5th Edition“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine
"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine
"For almost any computer book, you can find a... |  |  Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... |
|
| Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |