IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization.
Master advanced computer security and encryption techniques with this comprehensive guide covering cryptography, IPSEC, VPNs, and emerging technologies.
This book features selected high-quality papers from the Forth International Conference on Mobile Radio Communications and 5G Networks (MRCN 2023), held at University Institute of Engineering and Technology, Kurukshetra University, Kurukshetra, India, during August 25-26, 2023.
In a world experiencing unprecedented urbanization and drastic climate change, there is immense demand for creative solutions to the environmental, social, and economic obstacles faced by burgeoning cities in the developing world.
Start making the most of the latest collaboration tools in Microsoft 365-including Teams, SharePoint, Power Apps, Power BI, Power Automate, Microsoft Groups, Office ProPlus, Yammer, Planner, Stream, Forms, and OneDrive.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
This project-oriented book presents a hands-on approach to identifying migration and performance issues with experience drawn from real-world examples.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
31 Days Before Your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam Second Edition is the friendliest, most practical way to understand the CCNA Routing and Switching certification process; to commit to taking your CCNA 200-301 exam; and to finish your preparation using a variety of primary and supplemental study resources.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
The CompTIA Linux+ Certification"e; book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification.
While 3G has been an outstanding success, the ever-growing demand for higher data rates and higher quality mobile communication services continues to fuel conflict between the rapidly growing number of users and limited bandwidth resources.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India, during March 6-8, 2024.
Fully updated computer security essentials-quality approved by CompTIALearn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting.
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam domainsThoroughly revised for the April 2015 exam update, SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition enables you to take the exam with complete confidence.
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet.
Thoroughly revised for the new CompTIA Network+ exam, the Seventh Edition of this bestselling All-in-One Exam Guide delivers 100% coverage of the exam objectives and serves as a valuable on-the-job referenceTake the latest version of the CompTIA Network+ exam with complete confidence using the fully updated information contained in this comprehensive self-study system.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
This effective self-study guide serves as an accelerated review of all exam objectives for the CompTIA PenTest+ certification examThis concise, quick-review test preparation guide offers 100% coverage of all exam objectives for the new CompTIA PenTest+ exam.
This fully updated, money-saving collection covers every objective on the CompTIA Security+ exam SY0-501 and contains bonus contentThis up-to-date test preparation bundle covers every objective on the latest version of the CompTIA Security+ exam.
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications.
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and robotics, to achieve higher levels of efficiency, productivity, and safety.
Practice the Skills Essential for a Successful IT Career80+ lab exercises challenge you to solve problems based on realistic case studiesStep-by-step scenarios require you to think criticallyLab Analysis tests measure your understanding of lab resultsKey Term Quizzes help build your vocabularyMike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition covers:Network modelsCabling and topologyEthernet basicsEthernet standardsInstalling a physical networkTCP/IP basicsRoutingTCP/IP applicationsNetwork namingSecuring TCP/IPSwitch featuresIPv6WAN connectivityWireless networkingVirtualization and cloud computingData centersIntegrating network devicesNetwork operationsProtecting your networkNetwork monitoringNetwork troubleshooting
A new edition of Shon Harris' bestselling exam prep guide-fully updated for the new CISSP 2018 Common Body of KnowledgeThis effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains.
The book is a collection of best selected research papers presented at International Conference on Trends in Sustainable Computing and Machine Intelligence (ICTSM 2023) organized by Stamford International University, Bangkok, Thailand, during October 5-6, 2023.
As manufacturing control systems converge with manufacturing automation systems and systems supporting the back office, IT managers in manufacturing companies are being asked to oversee all their company's IT-including the manufacturing systems.
Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital RealmIn todays rapidly evolving digital landscape, the role of a Chief Information Security Officer (CISO) has never been more critical.