Fully updated to be aligned with the Project Management Body of Knowledge(R) (PMBOK(R) Guide), Sixth Edition, this study guide is structured per the PMP(R) Examination Content Outline (ECO), 2015 edition, which is the blueprint for the PMP(R) exam.
Fully updated to be aligned with the Project Management Body of Knowledge(R) (PMBOK(R) Guide), Sixth Edition, this study guide is structured per the PMP(R) Examination Content Outline (ECO), 2015 edition, which is the blueprint for the PMP(R) exam.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam.
One of the most difficult, yet important, questions regarding projects is "e;What advantages will this project create for the investors and key stakeholders?
One of the most difficult, yet important, questions regarding projects is "e;What advantages will this project create for the investors and key stakeholders?
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE).
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences.
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE).
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences.
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data infrastructure (SDI), container as well as serverless along with infrastructure as a Service (IaaS), IT as a Service (ITaaS) along with related technology, trends, tools, techniques and strategies.
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data infrastructure (SDI), container as well as serverless along with infrastructure as a Service (IaaS), IT as a Service (ITaaS) along with related technology, trends, tools, techniques and strategies.
Project management methodologies, practices, and guidelines are the only explicit information that project managers have and, when properly maintained, should reflect the most current knowledge and guidance to achieve repeatable successful project outcomes.
This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world.
This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world.
In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms.
In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms.
Most people marvel at the level of innovation demonstrated by the biopharmaceutical industry in bringing new products to the market - especially in the past 20 years.
Most people marvel at the level of innovation demonstrated by the biopharmaceutical industry in bringing new products to the market - especially in the past 20 years.
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components.
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components.
Learn how to identify vulnerabilities within computer networks and implement countermeasures that mitigate risks and damage with Whitman/Mattord's PRINCIPLES OF INCIDENT RESPONSE & DISASTER RECOVERY, 3rd Edition.
Explore macOS tools and architecture for executing support tasks and system administration, and prepare for the Apple Certified Support Professional (ACSP) certification examKey FeaturesDelve into macOS Big Sur, from installation to managing apps and optimizing your environmentBecome an Apple Certified Support Professional (ACSP) with this comprehensive macOS support guideThe book is not intended to be a user guide, it covers concepts pertinent for a user acting as an administratorBook DescriptionApple is pushing the capabilities of its technologies to help users achieve high performance, including improvements in its OS running across all Mac systems, macOS, and new technologies such as M1 Silicon chips.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organizationKey FeaturesBuild complex Python-based applications with IoTExplore different concepts, technologies, and tradeoffs in the IoT architectural stackDelve deep into each element of the IoT design-from sensors to the cloudBook DescriptionThe Internet of Things (IoT) is the fastest growing technology market.
Become a certified Azure Architect and learn how to design effective solutions that span compute, security, networking, and developmentKey FeaturesDiscover how you can design and architect powerful and cost-effective solutions on Microsoft AzurePrepare to achieve AZ-303 certification with the help of mock tests and practice questionsEnhance your computing, networking, storage, and security skills to design modern cloud-based solutionsBook DescriptionFrom designing solutions on Azure to configuring and managing virtual networks, the AZ-303 certification validates your knowledge and skills for all this and much more.
Discover the unified, distributed storage system and improve the performance of applications Key FeaturesExplore the latest features of Ceph's Mimic releaseGet to grips with advanced disaster and recovery practices for your storageHarness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systemsBook DescriptionCeph is an open source distributed storage system that is scalable to Exabyte deployments.
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal.
A comprehensive guide to understanding network architecture, communication protocols, and network analysis to build secure applications compatible with the latest versions of C# 8 and .
Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPMKey FeaturesAdapt to the modern data center design challenges and improve storage efficiencyEffective recipes to help you create your own robust architectural designs Solve data protection and recovery problems in your organizationBook DescriptionSystem Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data.