Articles

1421 Items

Sort by Date | Title

Communication and Meeting Management
By Robin Abernathy, Ann Lang
Dec 24, 2023

In this sample chapter from CompTIA Project+ PK0-005 Cert Guide, 2nd Edition, you will learn various communication factors and modes, common challenges to team communication, and the purposes of meeting-specific roles. This chapter covers the following objectives for the CompTIA Project+ exam: (1.8) Compare and contrast communication management concepts and (1.9) Given a scenario, apply effective meeting management techniques.

Operating System Hardening
By William Easttom
Dec 24, 2023

In this sample chapter from Network Defense and Countermeasures, 4th Edition, you will learn how to configure Windows and Linux systems for secure operations, apply operating system patches and application patches, and securely configure a web browser.

Determining Appropriate Data Security Controls
By Mark Wilkins
Jul 3, 2023

In this sample chapter from AWS Certified Solutions Architect - Associate (SAA-C03) Cert Guide, 2nd Edition, you will learn how your organization can define the security and accessibility of data records stored at AWS, with coverage on key concepts such as data access and governance, Amazon EBS encryption, Amazon S3 bucket security, and AWS Certificate Manager.

Development Approach and Life Cycle Performance Domain
By Vijay Kanabar, Thomas Lechler, Arthur P. Thomas
Jul 3, 2023

In this sample chapter from Certified Associate in Project Management (CAPM)® Exam Official Cert Guide, you will learn fundamental concepts involved in the Development Approach and Life Cycle Performance Domain and how to use deliverables and milestones in project planning and execution.

PL/SQL Concepts
By Benjamin Rosenzweig, Elena Rakhimov
Jul 3, 2023
Starting a Project and Integration
By Gregory M. Horine, Asad E. Haque
Jul 3, 2023

In this sample chapter from Project Management Professional (PMP)® Cert Guide, you will learn the key processes, tools, and artifacts for starting a project and integration management, from starting a project to monitoring it.

The Risk Management Plan (RMP)
By Carl Pritchard
Jul 3, 2023

In this sample chapter from Risk Management Professional (PMI-RMP)® Cert Guide, you will learn the structure and elements of a risk management plan, as well as the project manager's (or risk manager's) roles in developing the RMP.

Using Essential Tools
By Sander van Vugt
Jul 3, 2023

In this sample chapter from Red Hat RHCSA 9 Cert Guide: EX200, you will learn Linux skills that will prepare you for the RHCSA exam, including basic shell skills, how to edit files with vim, and an understanding of the shell environment.

Industrial Espionage in Cyberspace
By William Chuck Easttom
Jun 26, 2023

In this sample chapter from Computer Security Fundamentals, 5th Edition look into the hidden world of industrial espionage and its dangers. From trade secrets to cyber attacks, corporations face a rising threat. Explore real-world cases and learn how to safeguard your organization.

Understanding Common Techniques for Data Query Optimization and Testing
By Akhil Behl, Siva G Subramanian
Jun 26, 2023

In this sample chapter from CompTIA Data+ DA0-001 Exam Cram discover the secrets to maximizing the efficiency of your data queries. Dive into the world of query optimization, execution plans, parametrization, indexing, temporary tables, and subsets of records.

Asset Security
By Robin Abernathy, Darren R. Hayes
Feb 13, 2023

Assets are any entities that are valuable to an organization and include tangible and intangible assets. In this sample chapter from CISSP Cert Guide, 4th Edition, learn how to identify and classify information and assets, review information and asset handling requirements, explore the data life cycle, and more.

Manage Software Configurations
By William Rothwell
Jan 9, 2023

This chapter from CompTIA Linux+ XK0-005 Exam Cram covers XK0-005 Objective: 1.7: Given a scenario, manage software configurations.

Prepare for CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) test day
By Dave Prowse
Dec 17, 2022

This sample chapter from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1101) and Core 2 (220-1102) shares tools and information to help you be successful when preparing for test day.

Virtualization and Cloud Computing
By Rick McDonald
Nov 5, 2022

In this sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, you will review common cloud-computing concepts and characteristics of client-side virtualization.

Introduction to the World of IT
By Christopher Lee, Cheryl A. Schmidt
Oct 25, 2022

Many IT roles require detailed knowledge of PC hardware and software. In this sample chapter from Complete A+ Guide to IT Hardware and Software: CompTIA A+ Exams 220-1101 & 220-1102, 9th Edition, you will explore what skills a computer technician needs to perform well on the job, plus exam preparation tips for the CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102).

Implementing Scalability and Elasticity
By Richard Crisci, William Rothwell, Marko Sluga
Oct 17, 2022

In this chapter from AWS Certified SysOps Administrator - Associate (SOA-C02) Exam Cram, you will examine scaling, request offloading, and loose coupling as strategies that can enable an application to meet demand while maintaining cost-effectiveness.

Mobile Device Accessories and Ports
By Dave Prowse
Sep 24, 2022

This sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, covers A+ 220-1101 Objective 1.3: Given a scenario, set up and configure accessories and ports of mobile devices.

Securing the Enterprise Architecture by Implementing Data Security Techniques
By Troy McMillan
Sep 24, 2022

This sample chapter from CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide covers CAS-004 Objective 1.4: Given a scenario, implement data security techniques for securing enterprise architecture.

Device Access Control
By Donald Bacha
Mar 11, 2022

This sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram reviews the configuration and verification of network device access control with usernames and passwords.It also covers authentication, authorization, and accounting (AAA), and looks at the configuration and verification of network device access control on Cisco IOS devices using TACACS+ and RADIUS.

Footprinting, Reconnaissance, and Scanning
By Michael Gregg, Omar Santos
Mar 10, 2022

In this sample chapter from CEH Certified Ethical Hacker Cert Guide, 4th Edition, you will review a number of ways individuals can attempt to passively gain information about an organization and interactive scanning techniques.

Page 1 2 3 4 5 Next >

Topics