Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Information Security Management Handbook, Fifth Edition, Volume 3
Information Security Management Handbook, Fifth Edition, Volume 3
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and...
Microsoft  Windows PowerShell(TM) Step By Step
Microsoft Windows PowerShell(TM) Step By Step

Your hands-on, step-by-step guide to automating administration with Windows PowerShell.

Teach yourself the fundamentals of Windows PowerShell command line interface and scripting language. Written by a leading scripting expert, this tutorial delivers self-paced labs, timesaving tips, and hands-on sample scripts for automating Windows...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

CISSP All-in-One Exam Guide, Second Edition
CISSP All-in-One Exam Guide, Second Edition
This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!

The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers
...
Security+ Exam Cram 2 (Exam Cram SYO-101)
Security+ Exam Cram 2 (Exam Cram SYO-101)

The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a need to better train, staff, and empower those tasked with designing and implementing information security, and Security+ is an effort to meet this demand. Security+ will become the...

Microsoft Exchange Server 2007 Unleashed
Microsoft Exchange Server 2007 Unleashed
This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
The CISSP Prep Guide: Gold Edition
The CISSP Prep Guide: Gold Edition
An arsenal of inside information on CISSP and how to master the certification test!

More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy