Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Coronaviruses with Special Emphasis on First Insights Concerning SARS (Birkhýýuser Advances in Infectious Diseases)
Coronaviruses with Special Emphasis on First Insights Concerning SARS (Birkhýýuser Advances in Infectious Diseases)
It is with great pleasure that we introduce the first volume of Birkhäuser Advances in Infectious Diseases.This book series will focus on relevant topics of microbiology and infectious diseases with emphasis (as much as possible) on emerging pathogens and related diseases.The series will also stress the inter-disciplinarity...
Christianity and World Religions: Disputed Questions in the Theology of Religions
Christianity and World Religions: Disputed Questions in the Theology of Religions

An engaging and accessible introduction to Christianity’s relationship with other world religions, addressing the questions of why the reality, and vitality, of other religions has become a challenge, and showing how Christianity is equipped to deal with religious plurality at both the doctrinal and social level.

Strategic Information Security
Strategic Information Security

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies....

Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

The Lessons of Tragedy: Statecraft and World Order
The Lessons of Tragedy: Statecraft and World Order
An eloquent call to draw on the lessons of the past to address current threats to international order

The ancient Greeks hard?wired a tragic sensibility into their culture. By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a
...
Renewable and Efficient Electric Power Systems
Renewable and Efficient Electric Power Systems
Engineering for sustainability is an emerging theme for the twenty-first century, and the need for more environmentally benign electric power systems is a critical part of this new thrust. Renewable energy systems that take advantage of energy sources that won’t diminish over time and are independent of fluctuations in...
Compensating Your Employees Fairly: A Guide to Internal Pay Equity
Compensating Your Employees Fairly: A Guide to Internal Pay Equity

Compensation fairness is a universal preoccupation in today’s workplace, from whispers around the water cooler to kabuki in the C-suite. Gender discrimination takes center stage in discussions of internal pay equity, but many other protected characteristics may be invoked as grounds for alleging discrimination: age, race, disability,...

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

“Part John le Carré and more parts Michael Crichton . . . spellbinding.” –The New Yorker

From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a
...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy