Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
  • 1
    ISBN: 9780080570143 , 0080570143
    Language: English
    Pages: 1 online resource (xxxi, 710 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Microsoft Windows server ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Client/server computing ; Examination ; Study guides ; Microsoft software ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understand connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet. Designed to help newcomers to Microsoft certification study for and pass MCTS exam for Active Directory on their way to MCITP certification THE independent source of exam day tips, techniques, and warnings not available from Microsoft Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives Interactive FastTrack e-learning modules help simplify difficult exam topics Two full-function ExamDay practice exams guarantee double coverage of all exam objectives 1000 page "DRILL DOWN" reference for comprehensive topic review
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780080928326 , 0080928323
    Language: English
    Pages: 1 online resource (xv, 268 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Pro Tools ; Digital audio editors ; Electronic books ; local
    Abstract: Learn how to use Pro Tools to the max through every stage of the production process and become expert with the colossal power of this system with this book/website kit. This book and web combination shows exactly what Pro Tools can deliver at EVERY stage of the production process: set up, composition, tracking, editing, mixing and mix session delivery. Focusing on how to use the software, and covering usage, practice and problem solving across all areas, Pro Tools 8 Kit illustrates that there in't just one way to work with Pro Tools, but each situation can have multiple resolutions. With an in-depth section on speed editing techniques, effective use of commands and hidden features, comprehensive explanation of drum replacement and triggering VITAL to many areas of modern production, the author shows you the key to getting the most from producing with Pro Tools, demonstrating the logic behind the different approaches as well as providing practical advice and examples for all areas discussed. The website walks you through creating a recording, from setup through bouncing down your final track. The book and web combination offer the complete package--read the concepts, see the video and hear the accompanying audio and really nail the concepts.
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781597494281
    Language: English
    Pages: 1 online resource (xii, 189 p.) , ill., map.
    Series Statement: Syngress eleventh hour series
    Parallel Title: Erscheint auch als
    Keywords: Electronic data processing personnel ; Certification ; Computer networks ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: Eleventh Hour Security+: Exam SY0-201 Study Guide offers a practical guide for those preparing for the CompTIA Network+ exam. The book's 10 chapters provide in-depth discussions of the following topics: network fundamentals; network media; network devices; wireless networking; open systems interconnection (OSI) model and networking protocols; transmission control protocol/internet protocol (TCP/IP) and IP routing; wide area networking; hardware and software security; network management; and network troubleshooting. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers. The only book keyed to the new 2009 objectives that has been crafted for last minute cramming Easy to find, essential material with no fluff - this book does not talk about security in general, just how it applies to the test Includes review of five toughest questions by topic - sure to improve your score
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : For Dummies | Boston, MA : Safari
    ISBN: 9781119577485
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!
    Note: Online resource; Title from title page (viewed May 19, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley | Boston, MA : Safari
    ISBN: 9781119680017
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The best source for cutting-edge insights into AI in healthcare operations AI in Healthcare: How Artificial Intelligence Is Changing IT Operations and Infrastructure Services collects, organizes and provides the latest, most up-to-date research on the emerging technology of artificial intelligence as it is applied to healthcare operations. Written by a world-leading technology executive specializing in healthcare IT, this book provides concrete examples and practical advice on how to deploy artificial intelligence solutions in your healthcare environment. AI in Healthcare reveals to readers how they can take advantage of connecting real-time event correlation and response automation to minimize IT disruptions in critical healthcare IT functions. This book provides in-depth coverage of all the most important and central topics in the healthcare applications of artificial intelligence, including: Healthcare IT AI Clinical Operations AI Operational Infrastructure Project Planning Metrics, Reporting, and Service Performance AIOps in Automation AIOps Cloud Operations Future of AI Written in an accessible and straightforward style, this book will be invaluable to IT managers, administrators, and engineers in healthcare settings, as well as anyone with an interest or stake in healthcare technology.
    Note: Online resource; Title from title page (viewed January 27, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780124104969 , 0124104967
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Maintenance and repair ; Computer networks ; Management ; Electronic books ; local ; Electronic books
    Abstract: The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers. Learn the fundamentals of using Wireshark in a concise field manual Quickly create functional filters that will allow you to get to work quickly on solving problems Understand the myriad of options and the deep functionality of Wireshark Solve common network problems Learn some advanced features, methods and helpful ways to work more quickly and efficiently
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9781597495912 , 1597495913
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computer networks ; Access control ; Electronic books ; local ; Electronic books
    Abstract: Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education. The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security. This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors. Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attack Defend your network against attacks that target your company's most vulnerable asset-the end user
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9781597494885 , 1597494887
    Language: English
    Pages: 1 online resource (xiii, 776 p.) , ill. +
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local ; Electronic books
    Abstract: CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition , offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam. The book begins with a brief history of the development of networks, including their origins and where they are heading. It describes network models such as centralized and decentralized, and distinguishes between a local area network (LAN) and a wide area network (WAN). The discussions include cable connections and termination for the Network+ exam; the meaning of convergence; and the most common network devices being used on small and large networks, including the Internet. The role of switches in improving network functionality and enhancing security is described. The book also contains chapters on wireless networking; Open Systems Interconnection (OSI) model; Transmission Control Protocol/Internet Protocol (TCP/IP); wide area network (WAN) technologies; network security; and network management and troubleshooting. New to this edition in accordance with the newly revised exam is an intensified focus on network security Two NEW practice exams to help eliminate test-day jitters Tiered chapter ending questions that allow for graduated learning Covers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mind Layout of the guide parallels the Network+ N10-004 objectives for ease of study
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 238 p. , ill. ; , 22 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Electronic books ; local
    Abstract: If you're in need of a quick, concise tutorial to learn Unix and get on your way, this is it. Sams Teach Yourself UNIX in 10 Minutes, Second Edition will help you quickly and easily learn UNIX essentials and review UNIX features and functions. You will master components of UNIX programming through clear, concise learning modules and step-by-step instructions without having to wade through a lot of fluff and theory. You will learn to: Get onto the system and use the command line Move about the file system Create, move, rename and delete files and directories Slice and dice command pipe data Use the vi Editor Print in the UNIX environment And more! Whatever your expertise level, Sams Teach Yourself UNIX in 10 Minutes will get you up and running with UNIX in no time.
    Note: Includes index. - Previous ed.: by William Ray. 1999
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128014684 , 0128014687
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Electronic intelligence ; Internet in espionage ; Cyber intelligence (Computer security) ; Internet ; Security measures ; Computer crimes ; Electronic books ; local ; Electronic books
    Abstract: At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations Find out about the legal basis of these attacks and threats - what is legal and what is not - and how to defend against any type of surveillance Learn how to thwart monitoring and surveillance threats with practical tools and techniques Real-world examples teach using key concepts from cases in the news around the world
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed Nov. 7, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...