Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Amazon S3 Cookbook
Amazon S3 Cookbook

Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently

About This Book

  • Learn how to store, manage, and access your data with AWS SDKs
  • Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Amazon Web Services for Mobile Developers: Building Apps with AWS
Amazon Web Services for Mobile Developers: Building Apps with AWS

A practical, real-world introduction to AWS tools and concepts

Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

The CISSP Prep Guide: Gold Edition
The CISSP Prep Guide: Gold Edition
An arsenal of inside information on CISSP and how to master the certification test!

More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)...

Inside Network Security Assessment: Guarding Your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the...
The Ultimate Digital Music Guide: The Best Way to Store, Organize, and Play Digital Music
The Ultimate Digital Music Guide: The Best Way to Store, Organize, and Play Digital Music

Iam a music lover. Big time. My wife and I try to catch at least one or two major shows a month, and I’m an “A Train” member of and frequent visitor to our local jazz club. (That’s the Dakota Jazz Club in Minneapolis, one of the best in the nation.) I have more than 1,700 albums in my music collection, or more than...

Pro PowerShell for Amazon Web Services: DevOps for the AWS Cloud
Pro PowerShell for Amazon Web Services: DevOps for the AWS Cloud

Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads in the Amazon Elastic Cloud Compute (EC2) cloud service. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy