Faster previews. Personalized experience. Get started with a FREE account.
Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

by Dinesh Kumar
168 Pages · 2018 · 5.3 MB · 3,084 Downloads · New!
" Happiness doesn't result from what we get, but from what we give. ” ― Ben Carson
Advanced Persistent Training
by Jordan Schroeder
92 Pages · 2017 · 1.1 MB · 2,697 Downloads · New!
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity.
CEH v9: Certified Ethical Hacker Version 9
by Raymond Blockmon
260 Pages · 2016 · 11.7 MB · 1,813 Downloads · New!
Master CEH v9 and identify your weak spots
Cisco Next-Generation Security Solutions
by Aaron Woland
368 Pages · 2016 · 11 MB · 4,514 Downloads · New!
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them.
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
by Darril Gibson
1080 Pages · 2015 · 38.5 MB · 3,229 Downloads · New!
CISSP Study Guide –  fully updated for the 2015 CISSP Body of Knowledge
Computer, Network, Software, and Hardware Engineering with Applications
by Norman F. Schneidewind
608 Pages · 2012 · 4,24 MB · 1,696 Downloads · New!
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software as if it exists in a vacuum with no relationship to the wider system. This is wrong because a system is more than software. It is comprised of people, organizations, processes, hardware, and software. All of these components must be considered in an integrative fashion when designing systems. On the other hand, books on computers and networks do not demonstrate a deep understanding of the intricacies of developing software. In this book you will learn, for example, how to quantitatively analyze the performance, reliability, maintainability, and availability of computers, networks, and software in relation to the total system. Furthermore, you will learn how to evaluate and mitigate the risk of deploying integrated systems. You will learn how to apply many models dealing with the optimization of systems. Numerous quantitative examples are provided to help you understand and interpret model results. This book can be used as a first year graduate course in computer, network, and software engineering; as an on-the-job reference for computer, network, and software engineers; and as a reference for these disciplines.
Configuration Management with Chef-Solo
by Naveed ur Rahman
116 Pages · 2014 · 2.37 MB · 3,668 Downloads · New!
Chef is a configuration management tool used to handle the hardest part of infrastructure, easing the deployment of servers and applications to any infrastructure. Chef-Solo is an open source version of the chef-client that allows you to use cookbooks with nodes, without requiring access to a Chef server. In any infrastructure, managing servers is one of the most critical tasks for any server administration. Chef-Solo makes the process of booting and provisioning many machines at the same time much easier.