The Practical, Foundational Technical Introduction to the World's #1 Cloud Platform Includes access to several hours of online training video: Mark Wilkins' expert training video library guides you through setting up core services and prepares you to deploy your own apps and resources.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessaryRealistic examples & step-by-step activities: practice hands-on without costly equipmentThe perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data.
Learn, prepare, and practice for CompTIA Project+ PK0-004 exam success with this CompTIA-approved Cert Guide from Pearson IT Certification, a leader in IT certification learning and a CompTIA Authorized Platinum Partner.
Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this CompTIA approved Cert Guide from Pearson IT Certification, a leader in IT certification learning and a CompTIA Authorized Platinum Partner.
The best fully integrated study system availableCOVERS GLOBAL STANDARD 3 With hundreds of practice questions and hands-on exercises, IC3 Certification Study Guide covers what you need to know--and shows you how to prepare--for the Internet and Computing Core Certification exams.
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer * Understand the realities of cybercrime and today's attacks * Build a digital forensics lab to test tools and methods, and gain expertise * Take the right actions as soon as you discover a breach * Determine the full scope of an investigation and the role you'll play * Properly collect, document, and preserve evidence and data * Collect and analyze data from PCs, Macs, IoT devices, and other endpoints * Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence * Analyze iOS and Android devices, and understand encryption-related obstacles to investigation * Investigate and trace email, and identify fraud or abuse * Use social media to investigate individuals or online identities * Gather, extract, and analyze breach data with Cisco tools and techniques * Walk through common breaches and responses from start to finish * Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur.
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer * Understand the realities of cybercrime and today's attacks * Build a digital forensics lab to test tools and methods, and gain expertise * Take the right actions as soon as you discover a breach * Determine the full scope of an investigation and the role you'll play * Properly collect, document, and preserve evidence and data * Collect and analyze data from PCs, Macs, IoT devices, and other endpoints * Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence * Analyze iOS and Android devices, and understand encryption-related obstacles to investigation * Investigate and trace email, and identify fraud or abuse * Use social media to investigate individuals or online identities * Gather, extract, and analyze breach data with Cisco tools and techniques * Walk through common breaches and responses from start to finish * Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur.
An Expert Guide to Building Oracle Database Cloud Infrastructures This is the first complete, practical guide to architecting, designing, and building Database Clouds with Oracle 12c.
An Expert Guide to Building Oracle Database Cloud Infrastructures This is the first complete, practical guide to architecting, designing, and building Database Clouds with Oracle 12c.
Routing TCP/IP, Volume II: CCIE Professional Development, Second Edition The definitive guide to Cisco exterior routing protocols and advanced IP routing issues-now completely updated Praised in its first edition for its readability, breadth, and depth, Routing TCP/IP, Volume II, Second Edition will help you thoroughly understand modern exterior routing protocols and implement them with Cisco routers.
Routing TCP/IP, Volume II: CCIE Professional Development, Second Edition The definitive guide to Cisco exterior routing protocols and advanced IP routing issues-now completely updated Praised in its first edition for its readability, breadth, and depth, Routing TCP/IP, Volume II, Second Edition will help you thoroughly understand modern exterior routing protocols and implement them with Cisco routers.
The authoritative, business-driven study resource for the tough CCDE Practical Exam CCDE Study Guide is written and reviewed by CCDE engineers and helps you to both improve your design skills and to study for and pass the CCDE exam.
The authoritative, business-driven study resource for the tough CCDE Practical Exam CCDE Study Guide is written and reviewed by CCDE engineers and helps you to both improve your design skills and to study for and pass the CCDE exam.
Sams Teach Yourself Big Data Analytics with Microsoft HDInsight in 24 Hours In just 24 lessons of one hour or less, Sams Teach Yourself Big Data Analytics with Microsoft HDInsight in 24 Hours helps you leverage Hadoop's power on a flexible, scalable cloud platform using Microsoft's newest business intelligence, visualization, and productivity tools.