Watch movie | Myth Legend Told As Fiction (9) | No comment
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Optimizing and Assessing Information Technology, + Web Site: Improving Business Project Execution
Optimizing and Assessing Information Technology, + Web Site: Improving Business Project Execution

A valuable guide to making better IT decisions within business

Optimizing and Assessing Information Technology is designed to be both easy-to-use and immediately useful. Engaging and accessible, this book has been created to help you focus on improving business project execution through effective IT optimization and...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
Sports Nutrition: Energy Metabolism and Exercise (Nutrition in Exercise & Sport)
Sports Nutrition: Energy Metabolism and Exercise (Nutrition in Exercise & Sport)

Exercise by itself tears down the body. To rebuild that body so that it expresses greater strength, endurance, and speed, requires sound nutritional practices based on fact rather than fad. Those practices must also recognize that specific needs vary greatly according to age, gender, and intensity of exercise.

Sports
...

Effective Math Interventions: A Guide to Improving Whole-Number Knowledge (The Guilford Practical Intervention in the Schools Series)
Effective Math Interventions: A Guide to Improving Whole-Number Knowledge (The Guilford Practical Intervention in the Schools Series)
Building foundational whole-number knowledge can help put K-5 students on the path to academic success and career readiness. Filling a gap for school practitioners, this book presents step-by-step guidelines for designing and implementing classwide, small-group, and individual interventions for mathematics difficulties. Effective procedures...
Internal Audit: Efficiency Through Automation
Internal Audit: Efficiency Through Automation
Internal Audit

Efficiency through Automation

Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly...

Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology examines cost-saving trends in architecture planning, administration, and management....
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

Projects--especially complex ones--are inherently risky. Between time constraints, technical challenges, and resource issues, things can easily go wrong--making the identification of potential risks an essential component of every project manager's job. Fully updated and consistent with the Risk Management Professional (RMP) certification...

Result Page: 72 71 70 69 68 67 66 65 64 63 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy