Home | Amazing | Today | Tags | Publishers | Years | Search 
Essential Scrum: A Practical Guide to the Most Popular Agile Process
Essential Scrum: A Practical Guide to the Most Popular Agile Process

A Practical Guide to the Most Popular Agile Process

 

The Single-Source, Comprehensive Guide to Scrum for All Team Members, Managers, and Executives

 

If you want to use...

The Official VCP5 Certification Guide (VMware Press Certification)
The Official VCP5 Certification Guide (VMware Press Certification)

Trust the bestselling Official Cert Guide series from VMware Press to help you learn, prepare, and practice for VCP5 exam success. They are the only VMware authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your...

CompTIA A+ Complete Lab Manual
CompTIA A+ Complete Lab Manual

Boost your understanding of CompTIA A+ exam principles with practical, real-world exercises

Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given day. It supports the theory explained in the test-prep...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
MOS 2010 Study Guide for Microsoft® Word Expert
MOS 2010 Study Guide for Microsoft® Word Expert

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use...

Wiley Pathways Network Security Fundamentals
Wiley Pathways Network Security Fundamentals
College classrooms bring together learners from many backgrounds, with a variety of aspirations. Although the students are in the same course, they are not necessarily on the same path. This diversity, coupled with the reality that these learners often have jobs, families, and other commitments, requires a flexibility that our...
CCNP Security IPS 642-627 Official Cert Guide
CCNP Security IPS 642-627 Official Cert Guide

Learn, prepare, and practice for exam success

 

CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,...

CCNA ICND2 640-816 Official Cert Guide (3rd Edition)
CCNA ICND2 640-816 Official Cert Guide (3rd Edition)

New Edition of Best Selling Official Cert Guide: Updated Content, New Exercises, and Expanded Coverage -- PLUS includes CCNA Network Simulator Lite

 

The new edition of bestselling CCNA ICND2 640-816 Official Cert Guide by Wendell Odom has...

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Networking for People Who Hate Networking: A Field Guide for Introverts, the Overwhelmed, and the Underconnected
Networking for People Who Hate Networking: A Field Guide for Introverts, the Overwhelmed, and the Underconnected

Devora Zack, an avowed introvert and a successful consultant who speaks to thousands of people every year, found that most networking advice books assume that to succeed you have to become an extrovert. Or at least learn how to fake it. Not at all. There is another way.

This book shatters stereotypes about people
...

MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring
MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring

MCTS Windows 7 Configuring Cert Guide (Exam 70-680) is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows 7. This book covers the “TS: Microsoft Windows...

Result Page: 48 47 46 45 44 43 42 41 40 39 38 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy