Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)

Modernize your IT skills for the new world of cloud computing!

Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and...

Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Run-time Models for Self-managing Systems and Applications (Autonomic Systems)
Run-time Models for Self-managing Systems and Applications (Autonomic Systems)

This edited volume focuses on the adoption of run-time models for the design and management of autonomic systems. Traditionally, performance models have a central role in the design of computer systems. Models are used at design-time to support the capacity planning of the physical infrastructure and to analyze the effects and trade-offs of...

Pro SQL Server 2012 Reporting Services (Professional Apress)
Pro SQL Server 2012 Reporting Services (Professional Apress)

At its core, the process of designing reports hasn’t changed substantially in the past 20 years. The report designer lays out report objects, which contain data from a known source of data, in a design application such as Reporting Services, Business Objects Reports, or Microsoft Access. He or she then tests report execution,...

How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
Several times in my Enterprise Architecture (EA) practice, people asked me which framework shall I adopt or what are the benefits of the Zachman framework over TOGAF, etc. Others asked me to help them to define their own corporate EA framework. Before answering these types of questions, it is important to know what the differences and commonalities...
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understanding and experience of agile development. To help bridge the...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365
Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365

Pro Exchange 2013 SP1 PowerShell Administration is your one-stop resource for both basic and advanced administration of Exchange Server 2013 Service Pack 1 and Exchange Online, Microsoft's best-selling hosted Exchange service.

The industry shift that is currently happening toward ‘the cloud’ is not just...

PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
The tools and techniques for leveraging PKI technologies to provide secure Internet transactions

Do your customers have the confidence to do business over the Internet? By implementing Public Key Infrastructure (PKI) technologies, you’ll be able to quickly gain their trust through secure transactions. This book provides you with a clear...

Result Page: 23 22 21 20 19 18 17 16 15 14 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy