LPIC-2 is an intermediate level certification. Candidates should be able to perform advanced system administration and manage networking as well as authentication and system security. Passing both exa
The Aviation and Transportation Security Act established TSA as the federal agency with primary responsibility for securing the nation’s civil aviation system, which includes the screening of all pass
Whistleblowing serves as a check/balance system to the government bureaucracy, helping to bypass administrative roadblocks and to provide a mechanism through which homeland security can monitor and in
Read for FREE with Kindle Unlimited!Linux: Beginners guide for learning Linux & Shell scriptingDo you want to learn the Linux Operating System? Do you want to understand how you can use your computer
A computer cluster consists of a set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system.
No computer provides a trouble-free experience. This handy guide walks you through ways to diagnose, fix, and prevent the most common Mac hardware, software, and operating system problems. You'll lear
The author of The Zealots Guide To Computer Security 2013, and 17 other books brings you this handy guide to making Linux Mint secure for use in business environments.
Understanding the underlying system of how files are stored, what happens when they are deleted, and how to potentially recover them is essential to the digital forensic examiner. Today’s computer for
In the basement vaults lie more than $8 billion worth of rough, uncut diamonds. Above, the most advanced security system in all of Europe. Yet somehow two men manage to break into the London headqua
International Playgirl Zaydee finds herself in the midst of a crisis fueled by international intrigue, multinational corporate greed, and a convoluted legal system. Imprisoned for computer hacking, t
Imagine an Earth restored to perfection under the care of ten women Guardians, who answer only to a governing computer. Imagine a peaceful, colonized Solar System. This is what the New Victorian Empir
Imagine an Earth restored to perfection under the care of ten women Guardians, who answer only to a governing computer. Imagine a peaceful, colonized Solar System. This is what the New Victorian Empir
The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implemen
If you have ever wondered how a quantum computer works - or if you want to know how to program a quantum computer yourself - then this is the book for you.This book contains an introduction to quantu
This Companion Volume to our Dictionary of Computer and Internet Terms (Vol.2) - Dictionary of Computer Acronyms and Abbreviations, has 4,300 terms. It also includes a section on file name extensi
Learn how to pass the New York Security Officer Exam and become a Security Officer for a municipality in New York State. The number of candidates taking the exam has increased dramatically in recent y
‧ Cornell Note Taking System ‧ 108 pages, 8.5" X 11"‧ Notebook with white sheets features the Cornell note taking system.‧ Cornell note taking system provides the user with a clear,
Some of the most promising careers today can be found in the field of computer hardware engineering. With computers continuing to spread throughout everyone’s personal life and across government and b
This book is Volume 2 of the series, FYSOS: Operating System Design, and will describe the process needed to connect a file system to your kernel. It explains the steps to create a file system indepe
Social Security will reduce benefits in about 2033. Pick the right Social Security benefit timing for you.Create budgets that guide your spending. Create an investment plan for 30 years. Create tax-FR
This is a graduate textbook in Statistical Physics intended for students in Physics, Biophysics, Chemistry, Materials Science, and Engineering. It is based on using computer simulations in Python as a
Network Systems and Security (Principles and Practice), New Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. The book started from the meaning
Research shows that during the past 5 years 80-90% of security breaches in healthcare has been due to people inside the organization. Security culture and information assurance governance is the only
Zuto: The Adventures of a Computer Virus takes place inside a strange, little-known world: a personal computer, the perfect setting for a fast-paced, funny, one-minute-long story.Zuto, a smart, sneak
The computer is here to stay and indeed indispensable in today’s world. What with laptops and ipadds, iphones, video games, cell phones and so on.For whether we know it or not computer devices like ce
The development of computer graphics has made computers easier to interact with, to understand and to interpret different types of data. Developments in computer graphics have made profound impact on
This updated version of the popular 2006 book is a comprehensive security-training manual that provides all the tools a professional private security guard needs to survive and act within the law. Eac
Welcome Future Coder! Are You Ready To Learn And Start Programming With Any Language In 2 Hours? Learning to write computer programs can be fun if you take up the right approach and this shall be the
Divorcees have a tough job ahead of them as they try to understand what Social Security benefits may be available to them. This book provides a concise, easy-to-follow, guide for divorcees to learn ab
Are you just getting by on just a few computer tips some dude showed you in college and wondering why you're stressed and working long hours?You're working on the greatest, time-saving invention ever.
A translation and reproduction of a Japanese book about Bojutsu. Matsumoto Torata developed this system of Bojutsu (fighting with a staff) in the 1920s. He intended this system to be used in Junior
The Information in Warfare Group of the U.S. Army War College is proud to publish “China’s Cyber Power and America’s National Security” by Colonel Jayson M. Spade. This effort represents the first res
The book is a short history of the computer industry, starting with relay computers and ending with the IBM PC, introduced in 1981. Before digital computers, there were digital switching systems, used
This book discusses IPAD and desktop computer forensics and some of the tools that are used in order to identify, preserve, analyze, and report on digital evidence. It also discusses some of the acade
System requirements specification (SyRS) is, in the systems development life cycle, a result of the requirements and specifications phase. That is, a system requirements specification is for the analy
In this age of disappearing pensions and decimated retirement savings accounts, Social Security benefits are becoming more and more important all the time. As the baby boom generation reaches retireme
Do-It-Yourself Java Games uses a unique "discovery learning" approach to teach computer programming: learn Java programming techniques more by doing Java programming than by reading about th
Eric Layton, a well-known solar expert, wrote this guide for readers that are trying to build their own solar or wind system. Using pictures, this do-it-yourself (DIY) solar and wind system was built
This book offers an introduction to API security with OAuth 2.0 and OpenID Connect. In less than 80 pages you will gain an overview of the capabilities of OAuth. You will learn the core concepts of OA
Years after the Marines brought them together, the men of Corps Security are together again. These six novels follow their lives as they take a chance at love. Can love truly conquer all? From broken