Аннотация

Аннотация

The Self-Taught Computer Scientist is Cory Althoff's follow-up to The Self-Taught Programmer , which inspired hundreds of thousands of professionals to learn how to program outside of school. In The Self-Taught Programmer , Cory showed readers why you don't need a computer science degree to program professionally and taught the programming fundamentals he used to go from a complete beginner to a software engineer at eBay without one. In The Self-Taught Computer Scientist , Cory teaches you the computer science concepts that all self-taught programmers should understand to have outstanding careers. The Self-Taught Computer Scientist will not only make you a better programmer; it will also help you pass your technical interview: the interview all programmers have to pass to land a new job. Whether you are preparing to apply for jobs or sharpen your computer science knowledge, reading The Self-Taught Computer Scientist will improve your programming career. It's written for complete beginners, so you should have no problem reading it even if you've never studied computer science before.  

Аннотация

Master CEH v11 and identify your weak spots  CEH: Certified Ethical Hacker Version 11 Practice Tests  are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification.  Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare.  Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.

Аннотация

Аннотация

Аннотация

INFORMATION SECURITY Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook: Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments Discusses software security issues, ranging from malware detection to secure software development Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resources Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.

Аннотация

Аннотация

This Study Guide helps you understand the job role and responsibilities of a Microsoft 365 Teams Administrator. It's your one-stop resource for learning new skills, preparing to take the exam, and boosting your career! Cloud technology has become a major component of how services are delivered to customers. It's creating new roles and expanding others in all areas of technology. The Microsoft 365 Certified Associate Teams Administrator certification shows you're keeping pace with today's technology. MCA Microsoft 365 Certified Teams Administrator Study Guide is your best resource for understanding the job roles and responsibilities of a Teams Administrator and preparing to take the certification Exam MS-700. Microsoft 365 Teams Administrators focus on efficient and effective collaboration and communication in an enterprise environment. This Study Guide can help you understand best practices for configuring, deploying, and managing Office 365 workloads for Microsoft Teams that focus on efficient and effective collaboration and communication in an enterprise environment. Test your knowledge of all key exam objectives, including planning, deploying, and managing Teams chat, apps, channels, meetings, audio conferencing, live events, and calling. This Sybex Study Guide also covers upgrading from Skype for Business to Teams, managing Teams settings by using PowerShell, and understanding integration points with other apps and services. Review everything you need to know to pass the Exam MS-700 and you’re your Microsoft 365 Certified Associate Teams Administrator certification Use Sybex’s exclusive online test bank to improve your ability to plan and configure a Microsoft Teams Environment Master the process of managing Chat, Calling, and Meetings within Microsoft Teams Become an expert at configuring Teams and App Policies, including integrating third-party apps and services Readers will also have access to Sybex's online test bank, including hundreds of practice questions, flashcards, and a glossary. Take your career to a new level with this Study Guide!

Аннотация

Avoid becoming the next ransomware victim by taking practical steps today  Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day.  In  Ransomware Protection Playbook , computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.  In addition to walking you through the necessary technical preventative measures, this critical book will show you how to:  Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs,  Ransomware Protection Playbook  is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization’s, data.

Аннотация