- Determining Appropriate Data Security Controls
- Jul 3, 2023
|
- Development Approach and Life Cycle Performance Domain
- Jul 3, 2023
|
- PL/SQL Concepts
-
By
Benjamin Rosenzweig, Elena Rakhimov
- Jul 3, 2023
|
- Starting a Project and Integration
- Jul 3, 2023
|
- The Risk Management Plan (RMP)
- Jul 3, 2023
|
- Using Essential Tools
- Jul 3, 2023
|
- Industrial Espionage in Cyberspace
-
By
William Chuck Easttom
- Jun 26, 2023
In this sample chapter from Computer Security Fundamentals, 5th Edition look into the hidden world of industrial espionage and its dangers. From trade secrets to cyber attacks, corporations face a rising threat. Explore real-world cases and learn how to safeguard your organization.
|
- Understanding Common Techniques for Data Query Optimization and Testing
-
By
Akhil Behl, Siva G Subramanian
- Jun 26, 2023
In this sample chapter from CompTIA Data+ DA0-001 Exam Cram discover the secrets to maximizing the efficiency of your data queries. Dive into the world of query optimization, execution plans, parametrization, indexing, temporary tables, and subsets of records.
|
- Asset Security
-
By
Robin Abernathy, Darren R. Hayes
- Feb 13, 2023
Assets are any entities that are valuable to an organization and include tangible and intangible assets. In this sample chapter from CISSP Cert Guide, 4th Edition, learn how to identify and classify information and assets, review information and asset handling requirements, explore the data life cycle, and more.
|
- Manage Software Configurations
-
By
William Rothwell
- Jan 9, 2023
This chapter from CompTIA Linux+ XK0-005 Exam Cram covers XK0-005 Objective: 1.7: Given a scenario, manage software configurations.
|
- Prepare for CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) test day
-
By
Dave Prowse
- Dec 17, 2022
This sample chapter from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1101) and Core 2 (220-1102) shares tools and information to help you be successful when preparing for test day.
|
- Virtualization and Cloud Computing
-
By
Rick McDonald
- Nov 5, 2022
In this sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, you will review common cloud-computing concepts and characteristics of client-side virtualization.
|
- Introduction to the World of IT
-
By
Christopher Lee, Cheryl A. Schmidt
- Oct 25, 2022
Many IT roles require detailed knowledge of PC hardware and software. In this sample chapter from Complete A+ Guide to IT Hardware and Software: CompTIA A+ Exams 220-1101 & 220-1102, 9th Edition, you will explore what skills a computer technician needs to perform well on the job, plus exam preparation tips for the CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102).
|
- Implementing Scalability and Elasticity
-
By
Richard Crisci, William Rothwell, Marko Sluga
- Oct 17, 2022
In this chapter from AWS Certified SysOps Administrator - Associate (SOA-C02) Exam Cram, you will examine scaling, request offloading, and loose coupling as strategies that can enable an application to meet demand while maintaining cost-effectiveness.
|
- Mobile Device Accessories and Ports
-
By
Dave Prowse
- Sep 24, 2022
This sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, covers A+ 220-1101 Objective 1.3: Given a scenario, set up and configure accessories and ports of mobile devices.
|
- Securing the Enterprise Architecture by Implementing Data Security Techniques
-
By
Troy McMillan
- Sep 24, 2022
This sample chapter from CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide covers CAS-004 Objective 1.4: Given a scenario, implement data security techniques for securing enterprise architecture.
|
- Device Access Control
-
By
Donald Bacha
- Mar 11, 2022
This sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram reviews the configuration and verification of network device access control with usernames and passwords.It also covers authentication, authorization, and accounting (AAA), and looks at the configuration and verification of network device access control on Cisco IOS devices using TACACS+ and RADIUS.
|
- Footprinting, Reconnaissance, and Scanning
-
By
Michael Gregg, Omar Santos
- Mar 10, 2022
In this sample chapter from CEH Certified Ethical Hacker Cert Guide, 4th Edition, you will review a number of ways individuals can attempt to passively gain information about an organization and interactive scanning techniques.
|
- Data Security and Compliance Controls in Cloud Environments
-
By
William Rothwell
- Feb 10, 2022
In this sample chapter from CompTIA Cloud+ CV0-003 Exam Cram, you will learn how to apply data security and compliance controls in cloud environments.
|
- Cloud, Mobile, and IoT Security
-
By
Omar Santos
- Jan 28, 2022
In this chapter from CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition, you will learn about different attacks against cloud, mobile, and IoT implementations.
|