|
|
|
|
|
HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution.
A “consensus project” of numerous computer security experts has culminated in a Guide for... | | Mastering Adobe Captivate 7
Bring a new level of interactivity and sophistication to your e-learning content with the user-friendly features of Adobe Captivate. This practical tutorial will teach you everything from automatic recording to advanced tips and tricks.
Overview
-
Enhance your projects by adding interactivity, animations,...
| | Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |
|
|
Oracle Embedded Programming and Application Development
Focusing on tried and true best practice techniques in cross-technology based Oracle embedded programming, this book provides authoritative guidance for improving your code compilation and execution. Geared towards IT professionals developing Oracle-based Web-enabled applications in PL/SQL, Java, C, C++, .NET, Perl, and PHP, it covers... | | Microsoft Exchange Server 2013 Inside Out Mailbox and High Availability
With a focus on mailbox and high availability features, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Tony Redmond, a Microsoft MVP and award-winning author, you will:
-
Understand major changes to Exchange Server architecture
... | | |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |