MCSA Windows Server 2016 Certification Guide : the Ultimate Guide to Becoming MCSA Certified.
MICROSOFT AZURE ARCHITECT TECHNOLOGIES : exam guide az-300;a guide to preparing for the az-300 microsoft azure architect technologies.
Microsoft Azure fundamentals certification and beyond : simplified cloud concepts and core Azure fundamentals for absolute beginners to pass the AZ-900 exam /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /
IMPLEMENTING MICROSOFT AZURE ARCHITECT TECHNOLOGIES az-303 exam prep and beyond;a guide to preparing for the az-303 microsoft azure...
ITIL foundation essentials : the exam facts you need /
FTCE Educational Media Specialist PK-12 : teacher certification exam /
ITIL 4 essentials : your essential guide for the ITIL 4 Foundation exam and beyond /
ITIL Foundation Essentials ITIL 4 Edition : the Ultimate Revision Guide /
ITIL® 4 High-Velocity IT (HVIT) Your Companion to the ITIL 4 Managing Professional HVIT Certification.
ITIL® 4 High-Velocity IT (HVIT) : Your Companion to the ITIL 4 Managing Professional HVIT Certification.
Service Integration and Management (SIAM(tm)) Professional Body of Knowledge (BoK)
Service Integration and Management (SIAM(tm)) Professional Body of Knowledge (BoK).
Praxis art sample test 10133 teacher certification exam /
Special education : teaching students with behavioral disorders/emotional disturbances : teacher certification exam /
Docker Certified Associate (DCA) Exam Guide : Enhance and validate your Docker skills by gaining Docker certification /
Success in Law Studies
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Securing the cloud : cloud computer security techniques and tactics /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Managing Cisco network security /
Nokia network security : solutions handbook /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Who goes there? : authentication through the lens of privacy /
Designing and building enterprise DMZs /
Nessus network auditing /
Cybersecurity governance in Latin America states, threats, and alliances /
Internet privacy rights : rights to protect autonomy /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Hack proofing XML /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Techniques and applications of digital watermarking and content protection /
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Technology and privacy : the new landscape /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /
Microsoft Identity and Access Administrator Exam Guide Implement IAM Solutions with Azure AD, Build an Identity Governance Strategy, and Pass the SC-300 Exam.