 |
|
|
|
 The CISSP Prep Guide: Mastering the Ten Domains of Computer SecurityA one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination
The CISSP Prep Guide
From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can... |  |  Amazon S3 Cookbook
Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently
About This Book
-
Learn how to store, manage, and access your data with AWS SDKs
-
Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
|  |  CISSP Exam Cram 2Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during... |
|
 Network Security Assessment: Know Your NetworkHow secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this... |  |  Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |  |  |
|
 Amazon Web Services for Mobile Developers: Building Apps with AWS
A practical, real-world introduction to AWS tools and concepts
Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and... |  |  IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... |  |  The CISSP Prep Guide: Gold EditionAn arsenal of inside information on CISSP and how to master the certification test!
More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)... |
|
|
|
Result Page: 3 2 1 |