Book picks similar to
CTS Certified Technology Specialist Exam Guide by Brad Grimes
nook
reference
technology
certifications
AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps
Shyam Seshadri - 2014
By the end of the book, you'll understand how to develop a large, maintainable, and performant application with AngularJS.Guided by two engineers who worked on AngularJS at Google, you'll learn the components needed to build data-driven applications, using declarative programming and the Model-view-controller pattern. You'll also learn how to conduct unit tests on each part of your application.Learn how to use controllers for moving data to and from viewsUnderstand when to use AngularJS services instead of controllersCommunicate with the server to store, fetch, and update data asynchronouslyKnow when to use AngularJS filters for converting data and values to different formatsImplement single-page applications, using ngRoute to select views and navigationDive into basic and advanced directives for creating reusable componentsWrite an end-to-end test on a live version of your entire applicationUse best practices, guidelines, and tools throughout the development cycle
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Sharks (Our Amazing World)
Kay de Silva - 2012
Children are given a well-rounded understanding of this beautiful fish: its anatomy, feeding habits and behavior. The following Sharks are featured:* The swift Black Tip Reef Shark* The dangerous Bull Shark* The resourceful Hammerhead Shark* The feared Great White Shark* The stealthy Lemon Shark* The fanged Nurse Shark* The gentle Whale Shark* The deceptive Wobbegong
Gray Man: Camouflage for Crowds, Cities, and Civil Crisis
Matthew Dermody - 2017
He hides in the corners of conformity. He only flaunts a quotidian nature. He meanders through the mundane and occupies the ordinary. Individual expression and exceptionalism are his enemies. The Gray Man is the forgettable face, the ghost guy, the hidden human. Implementing the concepts is more than looking less tactical, less hostile, or less threatening. It is the willful abandonment of anything and everything that defines oneself as different. Using his unique "S" word conceptual approach featured in Appear to Vanish, camouflage and concealment expert Matthew Dermody discusses the concepts, tactics and mindset necessary to assimilate into any urban environment. From the safety-conscious international traveler to the SERE contingencies of the deep cover foreign operative, GRAY MAN is the definitive urban concealment resource.
Mastering ArcGIS
Maribeth H. Price - 2003
The author's step-by-step approach helps students negotiate the challenging tasks involved in learning sophisticated GIS software. The fifth edition is updated to follow the new software release of ArcGIS 10. An innovative and unique feature of "Mastering ArcGIS" is its accompanying CD-ROM with narrated video clips that show students exactly how to perform chapter tutorials before attempting an exercise on their own.
Hidden In Plain Sight 10: How To Program A Quantum Computer
Andrew H. Thomas - 2018
This book contains an introduction to quantum mechanics, with complete instructions and videos showing you how to program a real quantum computer, provided by IBM.
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple - 2018
This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
Head First Networking
Al Anderson - 2009
You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can. With this book, you'll learn skills through a variety of genuine scenarios, from fixing a malfunctioning office network to planning a network for a high-technology haunted house. You'll learn exactly what you need to know, rather than a laundry list of acronyms and diagrams. This book will help you:Master the functionality, protocols, and packets that make up real-world networking Learn networking concepts through examples in the field Tackle tasks such as planning and diagramming networks, running cables, and configuring network devices such as routers and switches Monitor networks for performance and problems, and learn troubleshooting techniques Practice what you've learned with nearly one hundred exercises, questions, sample problems, and projects Head First's popular format is proven to stimulate learning and retention by engaging you with images, puzzles, stories, and more. Whether you're a network professional with a CCNA/CCNP or a student taking your first college networking course, Head First Networking will help you become a network guru.
Data Structures Using C++
D.S. Malik - 2003
D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.
Python: Programming: Your Step By Step Guide To Easily Learn Python in 7 Days (Python for Beginners, Python Programming for Beginners, Learn Python, Python Language)
iCode Academy - 2017
Are You Ready To Learn Python Easily? Learning Python Programming in 7 days is possible, although it might not look like it
Straw Bale Gardening
Joel Karsten - 2013
He has perfected the perfect way for anyone to have a garden without weeding, bending over, or using chemicals. If you follow his step by step methods and suggestions you will be assured to grow a beautiful and productive garden this year, even if you have never gardened before. The best part is that if the soil in your backyard is less than productive it doesn't matter at all. If you have sunlight and water, you will have a great garden this year. From the Arctic Circle in Northern Alaska to the heat of the desert in Saudi Arabia, people are using this method, and having great success. The booklet is full color with 78 pages, and has a perfect bind booklet binding.
Onboard Hindi - Learn a language before you land
Eton Institute - 2014
Learn the Alphabet and pronunciation as well as useful phrases in 8 categories, such as greetings, travel and directions, making friends to business and emergencies. Download, read and enjoy your vacation like never before.
Geographic Information Systems and Science
Paul A. Longley - 2001
Its unique approach communicates the richness and diversity of CIS in a lucid and accessible format. This fully revised and updated second edition reinforces the view of CIS as a gateway to science and problem solving, sets out the scientific principles that govern its use, and describes the impact of people on its development, design, and success. The second edition of Geographic Information Systems and Science includes:A new five-part structure: Foundations; Principles; Techniques; Analysis; and Management and Policy.All-new personality boxes of current GIS practitioners.New real-world applications of GIS.New or expanded coverage of important current topics:Location-based servicesDistributed computingVirtual and augmented realitiesHomeland securityBusiness GIS and geodemographicsThe emergence of geoportalsGrand challenges of GIScienceA new suite of instructor and student resources http://www.wiley.com/go/longleyThe second edition of Geographic Information Systems and Science is essential reading for undergraduates taking courses in GIS within departments of Geography, Environmental Science, Business (and Public) Administration, Computer Science, Urban Studies, Planning, Information Science, Civil Engineering, and Archaeology. It is also provides a key resource for foundation GIS courses on taught MSc and other higher-degree programs. Professional users of GIS from governmental organizations and industries across the private sector will find this book an invaluable resource with a wealth of relevant applications.