Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...
Cybersecurity for Executives: A Practical Guide
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business
Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
Covers 'What to...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
CISSP Training Kit
Your 2-in-1 Self-Paced Training Kit
EXAM PREP GUIDE
Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying...
VMware Horizon 6 Desktop Virtualization Solutions
Plan, design, and secure your virtual desktop environments with VMware Horizon 6 View
About This Book
Design a successful solution to deliver Windows desktops and applications as a service
Provide redundancy for components and design a backup solution and disaster recovery plan to protect...
Anonymizing Health Data: Case Studies and Methods to Get You Started
Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...
CISA Review Manual 2008 The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS...
|Result Page: 27 26 25 24 23 22 21 20 19 18 |