Adjunctive treatments, in which patients are provided additional modalities that can assist in their behavior change or the maintenance of their behavior change (i.
Microsoft(R) Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Your complete exam prep course with digital content-500+ practice exam questions, 3+ hours of video training, and much moreWith hundreds of practice exam questions, including new performance-based types, CompTIA Network+(R) Certification Study Guide, Seventh Edition (Exam N10-007) covers everything you need to know to prepare for this challenging exam.
With all of the vital personal and business data being shared on computer networks every day, security has become one of the most essential aspects of networking.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
CWSS certification will appeal to retail chains employing computer hardware and networking techniciansPlanet3 Wireless, founder of the CWNP program, reports that the home Wi-Fi market is expected to grow to more than $20 billion by 2009More than two billion wireless connectivity devices will ship in 2010, per the Gartner Group
Your one stop guide to automating infrastructure security using DevOps and DevSecOpsKey FeaturesSecure and automate techniques to protect web, mobile or cloud servicesAutomate secure code inspection in C++, Java, Python, and JavaScriptIntegrate security testing with automation frameworks like fuzz, BDD, Selenium and Robot FrameworkBook DescriptionSecurity automation is the automatic handling of software security assessments tasks.
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL injection using both manual and automated toolsExplore practical tips for various attack and defense strategies relating to SQL injectionBook DescriptionSQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet.
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos.
The best fully integrated study system available for Exam CN0-201With hundreds of practice questions and hands-on exercises, CompTIA CTP+ Convergence Technologies Professional Certification Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.
Take Full Advantage of the Oracle Solaris 11 Management FeaturesManage a highly scalable, cloud-based computing platform and deliver unmatched performance levels at every layer of your IT stack.
Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program.
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsKey FeaturesUnderstand how to identify and manage business drivers during transitionsExplore Microsoft Identity and Access Management as a Service (IDaaS) solutionOver 40 playbooks to support your learning process with practical guidelinesBook DescriptionMicrosoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management.
Untangle the complexity of OpenStack clouds through this practical tutorialAbout This BookNavigate through the complex jungle of components in OpenStack using practical instructionsThis book helps administrators, cloud engineers, and even developers to consolidate and control pools of compute, networking, and storage resourcesLearn to use the centralized dashboard and administration panel to monitor large-scale deploymentsWho This Book Is ForThis book is perfect for administrators, cloud engineers, and operators who want to get started with OpenStack, solve basic problems encountered during deployment, and get up to speed with the latest release of OpenStack.
Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS CloudKey FeaturesBuild highly robust systems using the cloud infrastructureMake web applications resilient against scheduled and accidental downtimeExplore and apply Amazon-provided services in unique ways to solve common design problemsBook DescriptionWhether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs.
Learn how to implement the reactive programming paradigm with C++ and build asynchronous and concurrent applications Key FeaturesEfficiently exploit concurrency and parallelism in your programs Use the Functional Reactive programming model to structure programs Understand reactive GUI programming to make your own applications using Qt Book DescriptionReactive programming is an effective way to build highly responsive applications with an easy-to-maintain code base.
Run Docker on AWS and build real-world, secure, and scalable container platforms on cloudKey FeaturesConfigure Docker for the ECS environmentIntegrate Docker with different AWS toolsImplement container networking and deployment at scaleBook DescriptionOver the last few years, Docker has been the gold standard for building and distributing container applications.
Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper.
Create advanced data and integrated solutions using Azure Event Grid, functions, and containersKey FeaturesGet familiar with the different design patterns available in Microsoft AzureDevelop Azure cloud architecture and a pipeline management systemGet to know the security best practices for your Azure deploymentBook DescriptionOver the years, Azure cloud services have grown quickly, and the number of organizations adopting Azure for their cloud services is also gradually increasing.
A comprehensive certification guide that will help you prepare for the exam from day one of your preparation journeyKey FeaturesGet well-versed with the nitty-gritty of Windows server 2016A practical guide towards installing, upgrading, and migrating to Windows Server 2016Enhance your skills with practice questions and mock testsBook DescriptionMCSA: Windows Server 2016 is one of the most sought-after certifications for IT professionals which include working with Windows Server and performing administrative tasks around it.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applicationsGet hands-on experience working with components like scanner, proxy, intruder and much moreDiscover the best-way to penetrate and test web applicationsBook DescriptionBurp suite is a set of graphic tools focused towards penetration testing of web applications.
Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures.
Build microservices-based enterprise applications with the latest version of Java EEKey FeaturesCreate microservices in Spring and deploy them with Docker and Mesos Examine a number of real-world use cases and hands-on code examplesDevelop distributed applications based on microservices architectureBook DescriptionCloud-based applications have been increasingly in demand, and this has caused a shift from monolithic to microservice applications.
Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization s security posture using the proven defense strategies in this thoroughly updated guide.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
An expert guide to helping you use DevOps techniques with the latest GitLab version to optimize and manage your software workflowKey FeaturesDelve into GitLab's architecture, and install and configure it to fit your environmentLearn about the underlying principles of Agile software development and DevOpsExplore Gitlab's features to manage enterprise cloud-native applications and servicesBook DescriptionGitLab is an open source repository management and version control toolkit with functions for enterprises and personal software projects.
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackersKey FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systemsDiscover various stealth techniques to remain undetected and defeat modern infrastructuresExplore red teaming techniques to exploit secured environmentBook DescriptionThis book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.
Master Python scripting to build a network and perform security operationsKey FeaturesLearn to handle cyber attacks with modern Python scriptingDiscover various Python libraries for building and securing your networkUnderstand Python packages and libraries to secure your network infrastructureBook DescriptionIt's becoming more and more apparent that security is a critical aspect of IT infrastructure.
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security-humansPeople-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security.
A comprehensive guide with extensive coverage on concepts such as OOP, functional programming, generic programming, and STL along with the latest features of C++Key FeaturesDelve into the core patterns and components of C++ in order to master application designLearn tricks, techniques, and best practices to solve common design and architectural challenges Understand the limitation imposed by C++ and how to solve them using design patternsBook DescriptionC++ is a general-purpose programming language designed with the goals of efficiency, performance, and flexibility in mind.
Demystify application development on cloud platform by leveraging the power of IBM BluemixAbout This BookThe first book in the market that discusses the power of IBM BluemixShows developers how to develop and deploy applications on the cloud platform using IBM BluemixA comprehensive guide to help you get started with IBM Bluemix also featuring samples applicationsWho This Book Is ForThis book is aimed at developers seeking to learn application development and deployment methods on IBM Bluemix.
Learn to build, secure, deploy, and manage your serverless application in Golang with AWS Lambda Key FeaturesImplement AWS lambda to build scalable and cost-efficient applications in GoDesign and set the data flow between cloud services and custom business logicLearn to design Lambda functions using real-world examples and implementation scenariosBook DescriptionServerless architecture is popular in the tech community due to AWS Lambda.
Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide.