Articles

1419 Items

Sort by Date | Title

Determining Appropriate Data Security Controls
Jul 3, 2023
Development Approach and Life Cycle Performance Domain
Jul 3, 2023
PL/SQL Concepts
By Benjamin Rosenzweig, Elena Rakhimov
Jul 3, 2023
Starting a Project and Integration
Jul 3, 2023
The Risk Management Plan (RMP)
Jul 3, 2023
Using Essential Tools
Jul 3, 2023
Industrial Espionage in Cyberspace
By William Chuck Easttom
Jun 26, 2023

In this sample chapter from Computer Security Fundamentals, 5th Edition look into the hidden world of industrial espionage and its dangers. From trade secrets to cyber attacks, corporations face a rising threat. Explore real-world cases and learn how to safeguard your organization.

Understanding Common Techniques for Data Query Optimization and Testing
By Akhil Behl, Siva G Subramanian
Jun 26, 2023

In this sample chapter from CompTIA Data+ DA0-001 Exam Cram discover the secrets to maximizing the efficiency of your data queries. Dive into the world of query optimization, execution plans, parametrization, indexing, temporary tables, and subsets of records.

Asset Security
By Robin Abernathy, Darren R. Hayes
Feb 13, 2023

Assets are any entities that are valuable to an organization and include tangible and intangible assets. In this sample chapter from CISSP Cert Guide, 4th Edition, learn how to identify and classify information and assets, review information and asset handling requirements, explore the data life cycle, and more.

Manage Software Configurations
By William Rothwell
Jan 9, 2023

This chapter from CompTIA Linux+ XK0-005 Exam Cram covers XK0-005 Objective: 1.7: Given a scenario, manage software configurations.

Prepare for CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) test day
By Dave Prowse
Dec 17, 2022

This sample chapter from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1101) and Core 2 (220-1102) shares tools and information to help you be successful when preparing for test day.

Virtualization and Cloud Computing
By Rick McDonald
Nov 5, 2022

In this sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, you will review common cloud-computing concepts and characteristics of client-side virtualization.

Introduction to the World of IT
By Christopher Lee, Cheryl A. Schmidt
Oct 25, 2022

Many IT roles require detailed knowledge of PC hardware and software. In this sample chapter from Complete A+ Guide to IT Hardware and Software: CompTIA A+ Exams 220-1101 & 220-1102, 9th Edition, you will explore what skills a computer technician needs to perform well on the job, plus exam preparation tips for the CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102).

Implementing Scalability and Elasticity
By Richard Crisci, William Rothwell, Marko Sluga
Oct 17, 2022

In this chapter from AWS Certified SysOps Administrator - Associate (SOA-C02) Exam Cram, you will examine scaling, request offloading, and loose coupling as strategies that can enable an application to meet demand while maintaining cost-effectiveness.

Mobile Device Accessories and Ports
By Dave Prowse
Sep 24, 2022

This sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, covers A+ 220-1101 Objective 1.3: Given a scenario, set up and configure accessories and ports of mobile devices.

Securing the Enterprise Architecture by Implementing Data Security Techniques
By Troy McMillan
Sep 24, 2022

This sample chapter from CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide covers CAS-004 Objective 1.4: Given a scenario, implement data security techniques for securing enterprise architecture.

Device Access Control
By Donald Bacha
Mar 11, 2022

This sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram reviews the configuration and verification of network device access control with usernames and passwords.It also covers authentication, authorization, and accounting (AAA), and looks at the configuration and verification of network device access control on Cisco IOS devices using TACACS+ and RADIUS.

Footprinting, Reconnaissance, and Scanning
By Michael Gregg, Omar Santos
Mar 10, 2022

In this sample chapter from CEH Certified Ethical Hacker Cert Guide, 4th Edition, you will review a number of ways individuals can attempt to passively gain information about an organization and interactive scanning techniques.

Data Security and Compliance Controls in Cloud Environments
By William Rothwell
Feb 10, 2022

In this sample chapter from CompTIA Cloud+ CV0-003 Exam Cram, you will learn how to apply data security and compliance controls in cloud environments.

Cloud, Mobile, and IoT Security
By Omar Santos
Jan 28, 2022

In this chapter from CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition, you will learn about different attacks against cloud, mobile, and IoT implementations.

Page 1 2 3 4 5 Next >