Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company  (8)
  • Safari Tech Books Online  (7)
  • Computer security ; Management
  • Electronic data processing personnel Certification
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 18 hr., 36 min.)
    Edition: 2nd edition
    Series Statement: LiveLessons
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Electronic videos ; local ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Computer networks ; Security measures ; Examinations ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: 18+ Hours of Video Instruction Learn everything you need to know to pass the Certified Ethical Hacker exam. Overview Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 18 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam. Build your ethical hacking skills with the foundations of reconnaissance, footprinting, enumeration, and vulnerability analysis and dive into hacking web servers, applications, wireless networks, IoT devices, and mobile platforms. Veteran security experts Omar Santos, Nick Garner, and Bo Rothwell provide a thorough foundation through demos and best practices for security risk analysis, as well as hacking tools and methods. With this knowledge, you will be able to confidently mitigate and help guard your network from the multifaceted attacks that you will encounter while also preparing you to pass the CEH exam. Regardless of your level of experience, this video course explores all sides of a multi-pronged cybersecurity attack to ensure that you are prepared to combat attack threats. About the Instructors Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. He is the author of several cybersecurity books and video courses. You can obtain additional information about Omar’s projects at omarsantos.io and h4cker.org. Nick Garner , CCIE No. 17871, is a solutions integration architect for Cisco Systems. He has been in Cisco Advanced Services supporting customers in both transactional and subscription engagements for 8 years. In his primary role, he has deployed and supported large-scale data center designs for prominent clients in the San Francisco Bay area. His primary technical focus outside of data center routing and switching designs is security and multicast. William “Bo” Rothwell has a passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. H...
    Note: Online resource; Title from title screen (viewed July 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135783467 , 0135783461
    Language: English
    Pages: 1 online resource (84 pages)
    Edition: 1st edition
    Series Statement: Cert guide
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Cloud computing Study guides Examinations ; Web services Study guides Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Amazon Web Services (Firm) ; Infonuagique ; Examens ; Guides de l'étudiant ; Services Web ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Examinations ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: The AWS Certified Sysops Administrator Associate certification demonstrates your expertise in deploying, managing, securing, optimizing, and automating solutions on the world's leading cloud platform, Amazon Web Services. AWS Certified Sysops Administrator Associate Cert Guide is the comprehensive self-study resource for Amazon's valuable new exam. Designed for all AWS Certified Sysops Administrator Associate candidates, this guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find: Hands-on labs you can perform with a free AWS account Real-world examples throughout Pre-chapter quizzes to assess knowledge upfront, and efficiently focus your study Foundation topics sections that explain concepts and configurations, and link theory to practice Key topics sections calling attention to every figure, table, and list you must know Exam Preparation sections with additional chapter review features Final preparation chapter with tools and resources to help you craft review and test-taking strategies and optimize study time A customizable practice test library This guide offers comprehensive, up-to-date coverage of all AWS Certified Sysops Administrator Associate topics related to: Deploying, provisioning, managing, and operating AWS systems that scale, are highly available, and are fault tolerant Implementing and managing data storage, and data flows into and out of AWS Choosing the right AWS service for each requirement Selecting the right best practices for AWS operations Enforcing security and compliance Projecting usage costs and establishing operational cost controls Moving on-premises workloads into AWS Automating and optimizing AWS systems for maximum efficiency and value
    Note: Online resource; Title from title page (viewed December 24, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780137341658 , 0137341652 , 9780135938058
    Language: English
    Pages: 1 online resource (714 pages)
    Edition: 1st edition
    DDC: 005.432076
    Keywords: Red Hat, Inc ; Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Electronic data processing personnel Certification ; Systems engineering Study guides Examinations ; Electronic books ; local ; Red Hat, Inc ; Linux ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Ingénierie des systèmes ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Examinations ; Operating systems (Computers) ; Examinations ; Systems engineering ; Examinations ; Study guides ; Study guides
    Abstract: Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master Red Hat RHCSA 8 EX200 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam-preparation tasks Practice with four unique practice tests Learn from two full hours of video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course , 3rd Edition. Red Hat RHCSA 8 Cert Guide is a best-of-breed exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website also contains two additional practice tests plus two full hours of personal video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course , 3rd Edition. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including Basic system management: Installation, tools, file management, text files, RHEL8 connections, user/group management, permissions, and network configuration Operating running systems: Managing software, processes, storage, and advanced storage; working with systemd; scheduling tasks; and configuring logging Advanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scripting Managing network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; and accessing network storage Companion Website The website contains two free, complete practice exams and two full hours of video training from the author’s Red Hat Certified System Ad...
    Note: Online resource; Title from title page (viewed December 13, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780135560891 , 0135560896
    Language: English
    Pages: 1 online resource (321 pages)
    Edition: 1st edition
    Keywords: Microsoft Windows (Computer file) Study guides Examination ; Microcomputers Study guides Maintenance and repair ; Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Microsoft Windows (Computer file) ; Micro-ordinateurs ; Entretien et réparations ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Microcomputers ; Maintenance and repair ; Examinations ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: Prepare for Microsoft Exam MD-101 –and help demonstrate your real-world mastery of skills and knowledge required to manage modern Windows 10 desktops. Designed for Windows administrators, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Deploy and update operating systems Manage policies and profiles Manage and protect devices Manage apps and data This Microsoft Exam Ref : Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have experience deploying, configuring, securing, managing, and monitoring devices and client applications in an enterprise environment About the Exam Exam MD-101 focuses on knowledge needed to plan and implement Windows 10 with dynamic deployment or Windows Autopilot; upgrade devices to Windows 10; manage updates and device authentication; plan and implement co-management; implement conditional access and compliance policies; configure device profiles; manage user profiles; manage Windows Defender; manage Intune device enrollment and inventory; monitor devices; deploy/update applications, and implement Mobile Application Management (MAM). About Microsoft Certification Passing this exam and Exam MD-100 Windows 10 fulfills your requirements for the Microsoft 365 Certified: Modern Desktop Administrator Associate certification credential, demonstrating your ability to install Windows 10 operating systems and deploy and manage modern desktops and devices in an enterprise environment. See full details at: microsoft.com/learn
    Note: Online resource; Title from title page (viewed August 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780135560624 , 0135560624 , 9780135560716 , 0135560713
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Microsoft Windows (Computer file) Study guides Examination ; Electronic data processing personnel Certification ; Electronic books ; local ; Microsoft Windows (Computer file) ; Electronic data processing personnel ; Certification ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: Prepare for Microsoft Exam MD-100: Windows 10—and help demonstrate your real-world mastery of skills and knowledge required to deploy, configure, secure, manage, and monitor Windows devices and client applications. Designed for Windows administrators, Exam Ref MD-100: Windows 10 focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Deploy Windows Manage devices and data Configure connectivity Maintain Windows This Microsoft Exam Ref MD-100: Windows 10 : Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have some experience administering Windows 10 and non-Windows devices and technologies About the Exam Exam MD-100: Windows 10 focuses on knowledge needed to deploy Windows; perform post-installation configuration; manage local users, local groups, and devices; configure data access and protection; configure devices with local policies; manage Windows security; configure networking; configure remote connectivity; configure system and data recovery; manage updates; and monitor and manage Windows. About Microsoft Certification Passing this exam and Exam MD-101: Managing Modern Desktops fulfills your requirements for the Microsoft 365 Certified: Modern Desktop Administrator Associate certification credential, demonstrating your ability to install Windows 10 operating systems and deploy and manage modern desktops and devices in an enterprise environment. See full details at: microsoft.com/learn
    Note: Online resource; Title from title page (viewed July 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 12 min.)
    Edition: 1st edition
    Keywords: Microsoft Windows (Computer file) Study guides Examination ; Electronic data processing personnel Certification ; Electronic videos ; local ; Microsoft Windows (Computer file) ; Electronic data processing personnel ; Certification ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: More than 8 hours of video instruction to help you support your organization’s Windows 10 deployment and prepare for Exam MD-100 Windows 10, one of the exams required to achieve Microsoft 365 Certified: Modern Desktop Administrator Associate. Overview This engaging, self-paced instructional video course demonstrates various aspects of deploying, maintaining, and securing Windows 10 devices and data. You learn methods and technologies that help you install and configure Windows 10, develop device management policies, protect data, improve security, configure networking, and more. If you’re planning to take Exam MD-100 Windows 10, this video course covers the exam objective domains published by Microsoft in a logical way for learning the technology and preparing for the exam. Throughout each lesson, Microsoft certified trainer and technical author Andrew Warren describes key concepts and puts them into action with demonstrations and real-world scenarios. You can follow along by building a test lab using virtual machines. About the Instructor Andrew Warren has more than 30 years of experience in the IT industry, many of which he has spent teaching and writing. He is a Microsoft Certified Trainer and has been involved as a subject matter expert in many of the Windows Server 2016 courses and as the technical lead in many Windows 10 courses. He also has been involved in developing TechNet sessions about Microsoft Exchange Server. He is the co-author of Exam Ref MD-100 Windows 10 and Exam Ref MD-101 Managing Modern Desktops and the author of Exam Ref 70-741 Networking with Windows Server 2016 and Exam Ref 70-742 Identity with Windows Server 2016 , published by Microsoft Press. Andrew is based in the United Kingdom and lives in rural Somerset, where he runs his own IT training and education consultancy. Skill Level Intermediate Learn How To Deploy Windows Manage devices and data Configure connectivity Maintain Windows Who Should Take This Course IT professionals who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment IT professionals who manage identity, access, policies, updates, and apps IT professionals who want to explore new and updated features in Windows 10 Windows 10 administrators preparing for Exam MD-100 Windows 10 Course Requirements Foundational IT skills Basic understanding of and experience with Windows networking
    Note: Online resource; Title from title screen (viewed September 12, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (447 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity—including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the most effective methods for combating the invidious corruption that, if unchecked, puts all nations at risk. Maximilian Edelbacher will be appearing at three upcoming events: June 28, 2012: Roundtable in the House of the European Union in Vienna on the topic "Financial Crimes: A Threat to European Security?" October 8, 2012: Roundtable in Joannneum, Austria on the topic "Financial Crimes: A Threat to Global Security" October 9, 2012: Book presentation at the Hans Gross Museum in Graz, Austria
    Note: Online resource; Title from title page (viewed April 19, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780789740106
    Language: English
    Pages: 1 online resource (1 video file, approximately 35 hr., 13 min.)
    Edition: 1st edition
    Keywords: Electronic data processing personnel Certification ; Computer security Study guides Examinations ; Electronic videos ; local ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; Study guides
    Abstract: The fast, powerful way to prepare for your CISSP exam! 30+ hours of personal video training from leading security expert Shon Harris Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient. Master the skills and concepts you need for all ten CISSP common body of knowledge domains: Access Control Application Security Business Continuity and Disaster Recovery Planning Cryptography Information Security and Risk Management Legal, Regulations, Compliance, and Investigations Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security System Requirements OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers COMPUTER: 500MHz or higher CPU; 128MB RAM or more
    Note: Online resource; Title from title screen (viewed May 1, 2009)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que Certification | Boston, MA :Safari,
    ISBN: 078973446X
    Language: English
    Pages: xxix, 351 p. , ill. ; , 23 cm. +
    Series Statement: Exam cram 2
    Parallel Title: Erscheint auch als
    DDC: 005.8
    Keywords: Electronic data processing personnel Certification ; Computer networks Study guides Examination ; Computer security ; Examinations ; Study guides ; Electronic books ; local ; Electronic data processing personnel ; Certification ; Computer networks ; Réseaux d'ordinateurs ; Examen ; Guides de l'étudiant ; Electronic books ; Study guides
    Abstract: A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066 Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2 . A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during the real exam. The book includes: Exam topic-focused chapters. Practice questions at the end of each chapter. Exam Alerts that highlight key terms and areas. Two full-length practice exams. An electronic test engine provided by MeasureUp on CD-ROM with additional practice exams. The "Cram Sheet" tearcard for last minute exam review. Prepare for the CISSP certification exam with the proven Exam Cram 2 learning tools provided in the CISSP Exam Cram 2 .
    Note: "Covers the fall 2005 exam"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    ISBN: 0789734621 , 9780789734624
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 658.404 S689 2005 [ONLINE]
    Keywords: Project management Study guides Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Gestion de projet ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Project management ; Examinations ; Electronic books ; Study guides
    Abstract: The PMP Exam Cram 2, Second Edition provides PMP exam candidates a condensed and focused study vehicle. Organized for optimal learning of criccal project management steps, it covers all objective areas presented by PMI. Candidates using the PMP Exam Cram 2, Second Edition will be able to easily decipher and effectively use PMI's PMBOK. You'll also find notes, tips and cautions to extend on PMP content, and it will explain the differences between traditional methods of project management and what PMI considers to be good project management techniques. Exam Alerts will help alert you to content that will most likely appear on the PMP exam, and practice questions are found both in the book and on the accompanying CD-ROM. You'll even be prepared for last-minute studying with the Cram Sheet tearcard. Give yourself the best chance possible for a great test score with the PMP Exam Cram 2, Second Edition .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    ISBN: 0768661102 , 9780768661101 , 078972801X , 9780789728012
    Language: English
    Pages: xxxiv, 727 p. , ill. ; , 24 cm. +
    Series Statement: Training guide series
    Parallel Title: Erscheint auch als
    Keywords: Electronic data processing personnel Certification ; Computer networks Study guides Security measures ; Examinations ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic books ; local ; Electronic data processing personnel ; Certification ; COMPUTERS ; Internet ; Security ; COMPUTERS ; Networking ; Security ; COMPUTERS ; Security ; General ; Computer networks ; Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Electronic books ; Study guides
    Abstract: The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2. (ISC)2 promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains. This book maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. In addition, the CD includes PrepLogic Practice Tests, Preview Edition, making it the ultimate guide for those studying for the CISSP exam.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Indianapolis, Ind.] : Que Certification | Boston, MA :Safari,
    ISBN: 0768661552 , 9780768661552 , 9780789729231 , 0789729237 , 1281082864 , 9781281082862 , 9786611082864 , 6611082867 , 0789729237
    Language: English
    Pages: xix, 286 p. , ill. ; , 23 cm
    Series Statement: Exam cram 2
    Parallel Title: Erscheint auch als
    Keywords: Electronic data processing personnel Certification ; Application software Study guides Examinations ; Application software ; Examinations ; Study guides ; Electronic books ; local ; Electronic data processing personnel ; Certification ; COMPUTERS ; Programming ; Open Source ; COMPUTERS ; Software Development & Engineering ; Tools ; COMPUTERS ; Software Development & Engineering ; General ; Application software ; Examinations ; Logiciels d'application ; Examens ; Guides de l'étudiant ; Electronic books ; Study guides
    Abstract: IT Certification Success Exam Cram 2 provides you with a detailed explanation of the certification arena from Ed Tittel, one of the most respected figures in the industry. The book explains the various certification programs, their prerequisites, what can be done with them, and where you might want to go next. Readers preparing for a certification exam find the best-selling Exam Cram 2 series to be the smartest, most efficient way to become certified. This book focuses exactly on what you need to know to get certified now!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 216 p. , ill. ; , 23 cm
    Keywords: Computer security ; Management ; Data protection ; Electronic books ; local
    Abstract: Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321118863
    Language: English
    Pages: p. cm
    DDC: 658.4/78
    Keywords: Computer security ; Management ; Electronic books ; local
    Abstract: Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and risks in this broader context must precede any security implementation to insure that all the relevant, underlying problems are first uncovered. The OCTAVE approach for self-directed security evaluations was developed at the influential CERT(R) Coordination Center. This approach is designed to help you: Identify and rank key information assets Weigh threats to those assets Analyze vulnerabilities involving both technology and practices OCTAVE(SM) enables any organization to develop security priorities based on the organization's particular business concerns. The approach provides a coherent framework for aligning security actions with overall objectives. Managing Information Security Risks , written by the developers of OCTAVE, is the complete and authoritative guide to its principles and implementations. The book: Provides a systematic way to evaluate and manage information security risks Illustrates the implementation of self-directed evaluations Shows how to tailor evaluation methods to different types of organizations Special features of the book include: A running example to illustrate important concepts and techniques A convenient set of evaluation worksheets A catalog of best practices to which organizations can compare their own 0321118863B05172002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 214 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8/068
    Keywords: Computer security ; Management ; Information technology ; Management ; Electronic books ; local
    Abstract: Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on? Will you be able to tell whether an incident is an attack or a glitch in the system? Do you know how to assess the possible damage from an incident? Incident Response shows you how to answer questions like these and create a plan for exactly what to do before, during, and after an incident. The authors of Incident Response draw on years of experience developing and taking part in incident response teams at the highest levels of government and business. They guide you through both the technical and administrative details of effective incident response planning as they describe: What incident response is, and the problems of distinguishing real risk from perceived risk The different types of incident response teams, and advantages and disadvantages of each Planning and establishing an incident response team State of the Hack® information about different types of attacks Recommendations and details about available tools for incident response teams Resources available to incident response teams Whatever your organization's size or purpose, Incident Response shows how to put in place an incident-response process that's as planned, efficient, and businesslike as any other IT operation in a mature organization. Incidents happen, and being able to respond to them effectively makes good business sense.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...