Certification
pdf | | 0101-01-01 | Author:Owner
( Category:
Microsoft
April 11,2024 )
epub |eng | | Author:Alan Calder
Anti-malware software As malware is constantly evolving, anti-malware must be kept up to date. The organisation must update the signature files (which store information on malware threats) in line with ...
( Category:
Certification
April 7,2024 )
epub |eng | | Author:Mohamed Aly Bouke
67. Answer: B. The process of determining what actions a user is allowed to perform Explanation: Authorization in the context of Access Control Services refers to the process of determining ...
( Category:
Security
April 3,2024 )
pdf | | 2022-10-26 | Author:Specialist, IP
( Category:
Microsoft
April 2,2024 )
epub |eng | 2023-11-30 | Author:Deane, Arthur J.; [Deane, Arthur J.]
Cloud development basics The key difference between application development in the cloud and in traditional IT models is that cloud development relies heavily on the use of cloud APIs. While ...
( Category:
Security
March 31,2024 )
pdf | | 2024-01-03 | Author:Omar Santos, Petar Radanliev
( Category:
Security
March 22,2024 )
pdf | | 2023-11-17 | Author:Hermans, Kris & Ltd, Cybellium
( Category:
Security
March 19,2024 )
pdf | | 2023-12-07 | Author:Hermans, Kris & Ltd, Cybellium
( Category:
Security
March 9,2024 )
epub |eng | 2024-02-15 | Author:Anthony Bruno & Steve Jordan
( Category:
Cisco
February 26,2024 )
epub |eng | 2023-11-19 | Author:Hermans, Kris & LTD, Cybellium
( Category:
Security
February 22,2024 )
epub |eng | 2024-02-17 | Author:Unknown
In understanding Azure's network infrastructure, it is also essential to consider the importance of compliance and data residency. Azure offers a plethora of regions and availability zones, ensuring that you ...
( Category:
Microsoft
February 20,2024 )
pdf | | | Author:Unknown
( Category:
Security
February 20,2024 )
epub |eng | 2023-03-27 | Author:Unknown
( Category:
Linux
February 10,2024 )
epub |eng | 2023-11-19 | Author:Hermans, Kris & Ltd, Cybellium
Understanding the core elements of exploitation in Linux systems invariably leads us to the discussion of shellcodes and payloads, intricate components that play crucial roles in the process of ethical ...
( Category:
Security
February 4,2024 )
epub |eng | 2023-10-02 | Author:Fairmont, Vincent
7.1 Creating Basic Charts Excel offers a variety of charts that you can use depending on the nature of your data. The common types of charts include Column, Line, Pie, ...
( Category:
Microsoft
February 2,2024 )
Popular ebooks
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9347)TCP IP by Todd Lammle(2641)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2313)
The KCNA Book by Nigel Poulton(1980)
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(1962)
Networking A Beginner's Guide by Bruce Hallberg(1935)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1665)
Unity Certified Programmer: Exam Guide by Philip Walker(1490)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1479)
PHP 7 Zend Certification Study Guide by Andrew Beak(1453)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1370)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1339)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(1314)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1304)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(1304)
Essential Office 2016 by Wilson Kevin(1254)
Mobile Computing Deployment and Management by Robert J. Bartz(1254)
Essential Office 2016 (Computer Essentials) by Kevin Wilson(1227)
The Tao of Network Security Monitoring by Richard Bejtlich(1195)
CCNA Cisco Certified Network Associate Practice Labs and Simulations by Shwergho Smith(1149)