 |
|
|
 |  |  Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |  |  MOS 2010 Study Guide for Microsoft® Word Expert
Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use... |
|
 Wiley Pathways Network Security Fundamentals
College classrooms bring together learners from many backgrounds,
with a variety of aspirations. Although the students are in the same
course, they are not necessarily on the same path. This diversity, coupled
with the reality that these learners often have jobs, families, and
other commitments, requires a flexibility that our... |  |  CCNP Security IPS 642-627 Official Cert Guide
Learn, prepare, and practice for exam success
CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,... |  |  CCNA ICND2 640-816 Official Cert Guide (3rd Edition)
New Edition of Best Selling Official Cert Guide: Updated Content, New Exercises, and Expanded Coverage -- PLUS includes CCNA Network Simulator Lite
The new edition of bestselling CCNA ICND2 640-816 Official Cert Guide by Wendell Odom has... |
|
|
Result Page: 48 47 46 45 44 43 42 41 40 39 38 |