The complete guide to planning, implementing, and operating IT as a Service (ITaaS) Ongoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT.
Deliver microservices architecture, step-by-step: from defining business problems through development, deployment, and monitoring Increasingly, organizations are modernizing application development by integrating open source technologies into a holistic architecture for delivering high-quality workloads to the cloud.
Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment.
Cisco IOS XR Fundamentals is a systematic, authoritative guide to configuring routers with Cisco IOS(R) XR, the next-generation flagship Cisco(R) Internet operating system.
The complete guide to Cisco(R) IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection.
Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them.
The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain "e;Blockchain's potential to transform businesses has generated a tremendous amount of excitement across industries.
A guide to the current technologies related to the delivery process for both live and on-demand services within IPTV delivery networks IPTV Delivery Networks is an important resource thatoffers an in-depth discussion to the IPTV (Internet Protocol Television) delivery networks for both live and on demand IPTV services.
Find out how you can leverage virtual machines and load balancers to facilitate secure and efficient networkingKey FeaturesDiscover the latest networking features and additions in Microsoft Azure with this updated guideUpgrade your cloud networking skills by learning how to plan, implement, configure, and secure your infrastructure networkProvide a fault-tolerant environment for your apps using Azure networking servicesBook DescriptionAzure's networking services enable organizations to manage their networks effectively.
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector.
Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and infrastructure across any hybrid cloud environment.
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind.
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector.
The CCNA 200-301 exam will challenge you to not only focus on the theory of a technology, but the ability to demonstrate mastery of configuration, verification, and troubleshooting.
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr.
Normal 0 false false false EN-US X-NONE X-NONE The perfect introduction to pen testing for all IT professionals and students * Clearly explains key concepts, terminology, challenges, tools, and skills * Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing.
Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats.
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers.
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr.
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures.
Leverage HubSpot to reach your target audience with the right content and convert them into loyal customersKey FeaturesExplore a full software stack for marketing, sales, and customer services to grow your businessUnderstand how to organize, track, and build better relationships with leads and customersLearn to prioritize and execute your marketing tasks in an efficient wayBook DescriptionEmpowering Marketing and Sales with HubSpot is your comprehensive solution to using HubSpot to achieve your business goals with a flexible and lean approach.
All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk.
What you must know to protect yourself today The digital technology explosion has blown everything to bits--and the blast has provided new challenges and opportunities.
The definitive Cisco SD-Access resource, from the architects who train Cisco's own engineers and partners This comprehensive book guides you through all aspects of planning, implementing, and operating Cisco Software-Defined Access (SD-Access).
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Enterprise Networking, Security, and Automation Companion Guide is the official supplemental textbook for the Enterprise Networking, Security, and Automation v7 course in the Cisco Networking Academy CCNA curriculum.
Master the foundations of modern Cisco Unified Communications (UC) system security This guide helps you build foundational knowledge for securing modern Cisco Unified Communications environments that support voice, video, messaging, and meetings, and support different types of real-time collaboration capabilities based on mobile/remote access and mobile devices based on bring-your-own-device (BYOD) initiatives.
DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming.
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world.
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures.
The definitive professional's guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support.
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world.
If you're considering the vastly improved 2007 version of SharePoint, this concise, practical and friendly guide will teach you how to get the most from the latest version of Microsoft's information-sharing and collaboration platform.
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches.
Provides the fundamental principles and practical tools needed to design next-generation wireless networks that are both energy- and spectrum-efficient.
DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming.