Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISA Review Manual 2008
CISA Review Manual 2008
The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

A+ Certification Training Kit
A+ Certification Training Kit
The A+ Certification program was created by a consortium of companies, including Microsoft, to define baseline knowledge and skill levels for IT professionals who support hardware and software based on the Intel platform. Fully updated to cover the latest operating systems, including Microsoft Windows(r) 2000, the A+ CERTIFICATION TRAINING KIT,...
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Photoshop for Right-Brainers: The Art of Photo Manipulation
Photoshop for Right-Brainers: The Art of Photo Manipulation
Attention Right-Brainers!

You're an artistic visionary, right? In your head you imagine clever image fixes, fanciful photo manipulations, and artworks of startling genius. But when it comes to bringing these visions to life on your computer -- well, that’s the hard part. If this sounds
...
Drools JBoss Rules 5.0 Developer's Guide
Drools JBoss Rules 5.0 Developer's Guide
Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
Programming Microsoft's Clouds: Windows Azure and Office 365
Programming Microsoft's Clouds: Windows Azure and Office 365

This book is intended for developers interested in learning more about how to develop against the set of Microsoft cloud services: Windows Azure and Office 365. In some cases, you can combine the two technologies to build your solution, but in other cases you will use only one of the cloud solutions, so understanding what each has to offer...

Cloud and Virtual Data Storage Networking
Cloud and Virtual Data Storage Networking
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the opportunity to meet and speak with thousands of information technology (IT) professionals around the world, both in person and virtually via different venues. Even as that last book was being printed, the ideas to be found in this new book were coming...
Java How To Program (Early Objects) (10th Edition)
Java How To Program (Early Objects) (10th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0133813436 / ISBN-13: 9780133813432. That package includes ISBN-10: 0133807800 / ISBN-13: 9780133807806 and ISBN-10:...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy