 |
|
|
|
 Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  Pro Data Backup and Recovery
Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems... |  |  Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools
Although this book has a brand new title, it is really an updated and revised second edition to Windows XP: Under The Hood.The first edition’s automotive-themed title came about because of a certain nostalgia that I felt and I know many people share: Don’t you long for the good-old days when you could pop the hood of your car and... |
|
|
| Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 |