Pearson Education, Inc., 2023. — 1485 p. — ISBN-13: 978-0-13-809627-4. Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master Red Hat RHCSA 9 EX200 exam topics. Assess your knowledge with chapter-ending quizzes and labs. Review key concepts with exam-preparation...
Cisco Press, 2017. — 577 p. — ISBN13: 978-1587144561 Today, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together...
Cisco Systems, 2023. - 691 p. - ISBN-10: 0-13-769012-6 Hybrid cloud adoption is accelerating, as companies discover that hybrid cloud architectures can reduce hosting costs, improve agility, promote scalability, accelerate deployment, and enhance security. Cisco Cloud Infrastructure is the definitive reference for every professional who needs to understand, implement, or manage...
EC-Council, 2022. - 430 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 458 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 382 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 583 p. The C|EH v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH continues to evolve to keep up with...
EC-Council, 2022. - 425 p. The C|EH v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH continues to evolve to keep up with...
EC-Council, 2022. - 545 p. The C|EH v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH continues to evolve to keep up with...
EC-Council, 2022. - 564 p. The C|EH v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH continues to evolve to keep up with...
EC-Council, 2022. - 426 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 262 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 182 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 382 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 432 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 252 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
EC-Council, 2022. - 273 p. - 2 files The Certified Ethical Hacking (CEHv12) certification program provides students with detailed instruction on information security topics including penetration testing, social engineering, web application hacking, network analysis, wireless networks, cryptography, forensics and legal implications of computer crimes. CEHv12 training teaches...
Cisco Systems, 2021. — 722 p. — ISBN-13 9780135895757. By containerizing applications and network services, you can achieve unprecedented levels of network agility and efficiency. Cisco IOS-XE, IOS-XR, and NX-OS Architecture have been augmented with compute virtualization capabilities to accommodate both native and third-party container hosting, empowering organizations to...
Cisco Press, 2021. — 1724 p. — ISBN 1587145286, 9781587145285 ACI Advanced Monitoring and Troubleshooting provides a solid conceptual foundation and in-depth technical knowledge for monitoring and troubleshooting virtually any problem encountered during testing, deployment, or operation of Cisco Application Centric Infrastructure (ACI) infrastructure. Authored by leading ACI...
Cormac Hogan and Duncan Epping, 2022. — 604 p. — ISBN 9798426658486. VMware’s vSAN has rapidly proven itself in environments ranging from hospitals to oil rigs to e-commerce platforms and is the top player in the hyperconverged space. Along the way, it has matured to offer unsurpassed features for data integrity, availability, space efficiency, stretched clustering, and cloud...
Cormac Hogan and Duncan Epping, 2022. — 604 p. — ISBN 9798426658486. VMware’s vSAN has rapidly proven itself in environments ranging from hospitals to oil rigs to e-commerce platforms and is the top player in the hyperconverged space. Along the way, it has matured to offer unsurpassed features for data integrity, availability, space efficiency, stretched clustering, and cloud...
O’Reilly Media, Inc., 2022. — 577 р. — ISBN 978-1-098-11316-2. Good software design is essential for the success of your project, but designing software is hard to do. You need to have a deep understanding of the consequences of design decisions and a good overview of available design alternatives. With this book, experienced C++ developers will get a thorough, practical, and...
4th Edition. — Cengage Learning, 2022. — 386 p. — ISBN 978-0357509753. Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. Wilson/Simpson/Antill's Hands-on Ethical Hacking and Network Defense, 4th edition, equips you with the knowledge and skills to protect networks...
Cisco Press, 2017. — 475 p. — ISBN-13 978-1-58714-451-6. CCNP Collaboration Exam 300-070 CIPTV1, Third Edition Now fully updated for Cisco’s new CIPTV1 300-070 exam Implementing Cisco IP Telephony and Video, Part 1(CIPTV1) Foundation Learning Guide is your Cisco authorized learning tool for CCNP Collaboration preparation. Part of the Cisco Press Foundation Learning Series, it...
Packt Publishing, 2022. — 680 p. — ISBN 13 9781838827694. Get up and running with Kubernetes 1.19 and simplify the way you build, deploy, and maintain scalable distributed systems Key Features Design and deploy large clusters on various cloud platforms Explore containerized application deployment, debugging, and recovery with the latest Kubernetes version 1.19 Become...
Cisco Systems, 2016. — 136 p. This publication is for network administrators who install, configure, and maintain Cisco Nexus switches. Cisco Nexus 9000 switches are designed for hardware-based VXLAN function. It provides Layer 2 connectivity extension across the Layer 3 boundary and integrates between VXLAN and non-VXLAN infrastructures. This can enable virtualized and...
Cisco Press, 2023. — 1124 p. — ISBN-13: 978-0-13-749232-9 The definitive professionals guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support. The advanced Catalyst 9800 wireless...
Wiley, 2022. — 627 p. — ISBN 978-1-119-88305-0. Reduce organizational cybersecurity risk and build comprehensive Wi-Fi, private cellular, and IOT security solutions. Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint...
СПб.: Питер, 2016. — 353 с. Если вы хотите научиться прогpаммировать первоклассные игpы, вам просто необходимо изучить язык C++. Эта книга поможет вам освоить разработку игp с самых азов, независимо от тoгo, есть ли у вас опыт npoгpaммирования. Гораздо интересней учиться, когда обучение превращается в игpy. Каждая глава книги описывает самостоятельный игpовой проект. В...
Cisco Systems, 2019. — 178 с. Введение. TrustSec политики основанные на группах. TrustSec Основы. Как это работает? Основные сценарии развертывания. Что Вы можете сделать? Маленький Тэг и множество возможностей. Что еще возможно? Настройка групповых политик. С чего начать? Управление политиками и изменения. Тонкая настройка.
Cisco Systems, 2021. — 117 с. Введение. Профилирование. AAA (802.1X и MAB). ISE Guest и Employee WebAuth. Оценка соответствия: Оценка десктопов. TrustSec и SDA. Заключение.
Independently published, 2020. — 320 p. — ISBN-13 979-8674657408. Have you always wondered how it is that a machine understands what you are saying? Did you wonder how Siri or Alexa always knows exactly what to show you when you ask them something? If you did, you have come to the right place. Machines are able to interpret and understand human beings and also interpret the...
Cisco Press, 2021. — 730 p. — ISBN-13 978-0-13-660266-8. CCNP Data Center Application Centric Infrastructure DCACI 300-620 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic...
Microsoft Press, 2021. — 606 p. — ISBN-13: 978-013-680509-0 Prepare for Microsoft Exam AZ-303―and help demonstrate your real-world mastery of architecting high-value Microsoft Azure solutions for your organization or customers. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft...
Microsoft Press, 2021. — 621 p. — ISBN-13: 978-013-678893-5 Exam Ref AZ-500 Microsoft Azure Security Technologies offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on specific areas of expertise modern IT professionals need to demonstrate real-world mastery of Azure security. Coverage...
Pearson Education, Inc, 2022. — 977 p. — ISBN 978-013-680538-0 Prepare for Microsoft Exam AZ-104 and help demonstrate your real-world mastery of implementing and deploying Microsoft Azure Infrastructure as a Service (IaaS). Designed for experienced cloud professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for...
3rd Edition (Rough Cuts). — Pearson Education, 2021. — 2155 p. — ISBN-13 978-0-13-690569-1. In C++20 for Programmers, the Deitels bring their proven Live Code approach to teaching today’s powerful new version of the C++ language. Like all Deitel Developer titles, they teach the best way possible: via hundreds of complete example C++ programs, with thousands of lines of...
Mc-Graw Hill, 2022. - 515p. - ISBN: 978-1-26-427473-4 Sixth Edition Practice the Skills Essential for a Successful IT Career 80+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab Analysis tests measure your understanding of lab results Key Term Quizzes help build your vocabulary Mike Meyers’...
IPSpecialist, 2018. — 674 p. This course provides in-depth understanding and complete course material to pass the Certification Exam. The workbook content is designed to take a practical approach to learning with real-life examples and case studies. Network Fundamentals. Network Access. IP Connectivity. IP Services. Security Fundamentals. Automation and Programmability.
Third Edition. — Pearson Education, 2020. — 961 p. — ISBN-13 978-0-7897-6052-4. In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors’ concise, focused approach explains every exam objective...
5fth Edition. — McGraw-Hill Education, 2014. — 817 p. — ISBN 978-0-07-181232-0. Get a solid foundation in Cisco products and technologies from this fully updated bestseller. Covering the latest solutions, Cisco: A Beginner’s Guide, Fifth Edition shows you, step-by-step, how to design, build, and manage custom networks. Learn how to configure hardware, use IOS commands, set up...
McGraw-Hill Education, 2015. — 847 p. — ISBN 978-0-07-183155-0. An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security...
Pearson Education, 2022. — 816 p. — ISBN-13 978-0-13-689193-2. CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram is the perfect study guide to help you pass the Cisco ENCOR 350-401 exam, a core requirement for your CCNP Enterprise, CCIE Enterprise Infrastructure, or CCIE Enterprise Wireless certification. This guide delivers expert coverage and practice questions for every...