From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
Complete, up-to-date coverage of the 2015 CISSP exam, including 1250+ realistic practice questionsFully updated and featuring new exam question formats, this self- study tool contains more than 1250 realistic practice exam questions and offers 100% coverage of the 2015 CISSP Common Body of Knowledge.
Written by the #1 name in IT security certification training, fully revised for the latest exam release, and featuring 750+ practice questions plus 24 hours of audio lecturesCISSP Practice Exams, Second Edition is the ideal companion to Shon Harris bestselling CISSP All-in-One Exam Guide.
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal.
The Most Complete CTS-I Exam Study SystemPublished with InfoComm International, CTS-I Certified Technology Specialist-Installation Exam Guide provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual installation professionals.
This Oracle Press guide shows how to implement key modules of Oracle Fusion Financials-General Ledger and Financials Accounting Hub-covering both the functional and technical aspects of this complete financial management solution.
The best fully integrated study system available for the CompTIA Cloud+ Certification examWith hundreds of practice questions, CompTIA Cloud+ Certification Study Guide covers what you need to know and shows you how to prepare for this challenging exam.
GET THE EDGE WITH NETWORKS AND PRODUCTS FOR "e;SMART"e; HOMES Get all the tools you need to work with the CEBus (Consumer Electronics Bus) standard in one handy resource.
An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource.
Solve complex business problems by understanding users better, finding the right problem to solve, and building lean event-driven systems to give your customers what they really wantKey FeaturesApply DDD principles using modern tools such as EventStorming, Event Sourcing, and CQRSLearn how DDD applies directly to various architectural styles such as REST, reactive systems, and microservicesEmpower teams to work flexibly with improved services and decoupled interactionsBook DescriptionDevelopers across the world are rapidly adopting DDD principles to deliver powerful results when writing software that deals with complex business requirements.
Build, secure, and deploy real-world serverless applications in AWS and peek into the serverless cloud offerings from Azure, Google Cloud, and IBM CloudKey FeaturesBuild serverless applications with AWS Lambda, AWS CloudFormation and AWS CloudWatchPerform data analytics and natural language processing(NLP)on the AWS serverless platformExplore various design patterns and best practices involved in serverless computingBook DescriptionManaging physical servers will be a thing of the past once you're able to harness the power of serverless computing.
Master the Big Data Capabilities of Oracle R EnterpriseEffectively manage your enterprise s big data and keep complex processes running smoothly using the hands-on information contained in this Oracle Press guide.
Learn how to apply modern AI to create powerful cybersecurity solutions for malware, pentesting, social engineering, data privacy, and intrusion detectionKey FeaturesManage data of varying complexity to protect your system using the Python ecosystemApply ML to pentesting, malware, data privacy, intrusion detection system(IDS) and social engineeringAutomate your daily workflow by addressing various security challenges using the recipes covered in the bookBook DescriptionOrganizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference.
Use a low-code programming approach to create event-driven applications from scratch by wiring together hardware devices, APIs, and online servicesKey FeaturesDiscover how you can automate the Internet of Things (IoT) without writing huge blocks of codeLearn how to wire together flows using a browser-based visual editorHandle IoT data with little to no coding knowledgeBook DescriptionNode-RED is a free and open source flow-based programming tool used to handle IoT data that allows programmers of any level to interconnect physical I/O, cloud-based systems, databases, and APIs to build web applications without code.
Search, analyze, and manage data effectively with Elasticsearch 7Key FeaturesExtend Elasticsearch functionalities and learn how to deploy on Elastic CloudDeploy and manage simple Elasticsearch nodes as well as complex cluster topologiesExplore the capabilities of Elasticsearch 7 with easy-to-follow recipesBook DescriptionElasticsearch is a Lucene-based distributed search server that allows users to index and search unstructured content with petabytes of data.
Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and toolsKey FeaturesDeal with remote network servers using SSH, FTP, SNMP and LDAP protocols.
Updated with the latest Maven coordinates, Java programming features, and API changes, this book is your guide to solving problems in writing asynchronous and event-based programsKey FeaturesExplore a variety of tools and techniques used to solve problems in implementing concurrency and parallelizationLearn about core operators in RxJava that enable you to express your code logic productivelyApply RxJava with Kotlin to create responsive Android apps with better user experienceBook DescriptionRxJava is not just a popular library for building asynchronous and event-based applications; it also enables you to create a cleaner and more readable code base.
A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisationKey FeaturesProtect your organization from cybersecurity threats with field-tested strategiesDiscover the most common ways enterprises initially get compromisedMeasure the effectiveness of your organization's current cybersecurity program against cyber attacksBook DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.
Enhance your skills in building scalable infrastructure for your cloud-based applicationsKey FeaturesLearn to design a scalable architecture by building continuous integration (CI) pipelines with KubernetesGet an in-depth understanding of role-based access control (RBAC), continuous deployment (CD), and observabilityMonitor a Kubernetes cluster with Prometheus and GrafanaBook DescriptionKubernetes is among the most popular open-source platforms for automating the deployment, scaling, and operations of application containers across clusters of hosts, providing a container-centric infrastructure.
Become an expert in implementing Azure Functions to work seamlessly with your serverless applicationsKey FeaturesDevelop scalable, robust multi-tier apps without worrying about infrastructure needsDeploy and manage cost-effective and highly available serverless apps using Azure FunctionsAccelerate enterprise-level application development by seamlessly integrating different cloud services with Azure FunctionsBook DescriptionApplication development has evolved from traditional monolithic app development to using serverless options and microservices.
Develop technical skills and expertise to automate AWS networking tasksKey FeaturesA fast paced guide that will help you pass the exam with confidenceLearn advanced skill sets to build effective AWS networking solutions Enhance your AWS skills with practice exercises and mock testsBook DescriptionAmazon has recently come up a with specialty certifications which validates a particular user's expertise that he/she would want to build a career in.
Become an expert at managing enterprise identity infrastructure by leveraging Active DirectoryKey FeaturesExplore the new features in Active Directory Domain ServiceManage your Active Directory services for Windows Server 2016 effectivelyAutomate administrative tasks in Active Directory using PowerShell Core 6.
Develop skills and knowledge for provisioning and managing services in Microsoft Azure and implement infrastructure componentsKey FeaturesBuild and manage robust infrastructure solutions on Microsoft AzurePlan and implement Azure storage, backup, and recovery servicesPrepare and boost your confidence with certification-based mock tests and solutionsBook DescriptionMicrosoft Azure is a prominent public cloud provider, recording the highest user base growth in the year 2017.
A practical guide to making the best use of the OpenShift container platform based on the real-life experiences, practices, and culture within Red Hat Open Innovation LabsKey FeaturesLearn how modern software companies deliver business outcomes that matter by focusing on DevOps culture and practicesAdapt Open Innovation Labs culture and foundational practices from the Open Practice LibraryImplement a metrics-driven approach to application, platform, and product, understanding what to measure and how to learn and pivotBook DescriptionDevOps Culture and Practice with OpenShift features many different real-world practices - some people-related, some process-related, some technology-related - to facilitate successful DevOps, and in turn OpenShift, adoption within your organization.
The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker.
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical.
Data Scientists are experts at analyzing, modelling and visualizing data but, at one point or another, have all encountered difficulties in collaborating with or delivering their work to the people and systems that matter.
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation.
Through conversation, journal entries, and actual e-mail dialogue, Judaism Online: Confronting Spirituality on the Internet tells the true story of one woman's remarkable spiritual journey.
Become a certified Azure Architect and learn how to design effective solutions that span compute, security, networking, and developmentKey FeaturesDiscover how you can design and architect powerful and cost-effective solutions on Microsoft AzurePrepare to achieve AZ-303 certification with the help of mock tests and practice questionsEnhance your computing, networking, storage, and security skills to design modern cloud-based solutionsBook DescriptionFrom designing solutions on Azure to configuring and managing virtual networks, the AZ-303 certification validates your knowledge and skills for all this and much more.
Learn best practices and the proper use of Azure management tools, such as Azure Portal, Azure PowerShell, Azure CLI, and ARM templates, which are time-saving tools that support daily administration tasks such as monitoring, alerting, backups, security, and more.
Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2018, held in Funchal, Madeira, Portugal, in January 2018.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.
This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019.