The authoritative, general reference that has been sorely missing in the field of mobile computing This book teaches all the main topics via the hottest applications in a rapidlygrowing field.
The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity.
Current data centre networks, based on electronic packet switches, are experiencing an exponential increase in network traffic due to developments such as cloud computing.
Security Smarts for the Self-Guided IT Professional An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it.
Implement an Effective Security Metrics Project or ProgramIT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization.
An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the newly-updated Certified in Risk and Information Systems Control (CRISC) certification exam with this comprehensive exam guide.
Maximize the latest iCloud capabilitiesThis all-new edition of How To Do Everything: iCloud fully covers iCloud s versatile features and offers step-by-step directions on how to use each one, including Shared Photo Streams, the iWork for iCloud apps, and iCloud Keychain.
Maximize Microsoft SharePoint 2013Written by a former member of the SharePoint development team, How to Do Everything: Microsoft SharePoint 2013 shows you how to get the most out of the latest release of this dynamic business collaboration platform.
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis.
The latest techniques for averting UC disasterEstablish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal.
Prepare for the 2015 CISSP exam with this up-to-date, money-saving study packageDesigned as a complete self-study program, this collection offers a variety of proven, exam-focused resources to use in preparation for the 2015 CISSP exam.
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"e;There's no question that attacks on enterprise networks are increasing in frequency and sophistication.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets.
What you must know to protect yourself today The digital technology explosion has blown everything to bits-and the blast has provided new challenges and opportunities.
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration, and support.
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guide-updated to cover the 2015 release of the CompTIA Network+ exam.
The only official study guide for CWNA Exam PW0-100Fully authorized by the exam developers at the CWNP program, this comprehensive study guide thoroughly covers all the topics on the CWNA certification exam.
Achieve Extreme Application Performance for a Private Cloud with Oracle Exalogic Elastic CloudTransition to a private cloud computing infrastructure and achieve unmatched levels of performance with help from this Oracle Press guide.
Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated.
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server.
Broadband Cable Access Networks focuses on broadband distribution and systems architecture and concentrates on practical concepts that will allow the reader to do their own design, improvement, and troubleshooting work.
Big Data Analytics for Sensor-Network Collected Intelligence explores state-of-the-art methods for using advanced ICT technologies to perform intelligent analysis on sensor collected data.
Deploying Next Generation Multicast-Enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet provides a comprehensive discussion of Multicast and MVPN standards-next-generation Multicast-based standards, Multicast Applications, and case studies with detailed configurations.
Cisco(R) ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to today's highly-sophisticated network attacks.
Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand.
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.
Practice the Skills Essential for a Successful IT CareerMike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Fourth Edition features:80+ lab exercises challenge you to solve problems based on realistic case studiesLab analysis tests measure your understanding of lab resultsStep-by-step scenarios require you to think criticallyKey term quizzes help build your vocabularyGet complete coverage of key skills and concepts, including:Network architecturesCabling and topologyEthernet basicsNetwork installationTCP/IP applications and network protocolsRoutingNetwork namingAdvanced networking devicesIPv6Remote connectivityWireless networkingVirtualization and cloud computingNetwork operationsManaging riskNetwork securityNetwork monitoring and troubleshootingInstructor resources available:This lab manual supplements the textbook Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Fourth Edition (Exam N10-006), which is available separatelySolutions to the labs are not printed in the book and are only available to adopting instructors
The industry-standard guide to networked audiovisual systemsPublished with InfoComm International, Networked AV Systems discusses the essential information AV and IT professionals need to know when working with network-driven equipment and processes.
Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments.
Master Oracle SOA Suite 12cDesign, implement, manage, and maintain a highly flexible service-oriented computing infrastructure across your enterprise using the detailed information in this Oracle Press guide.
State-of-the-art SIP primerSIP (Session Initiation Protocol) is the open standard that will make IP telephony an irresistible force in communications, doing for converged services what http does for the Web.
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers.