Breaking Down Cloud Security

Breaking Down Cloud Security  eBooks & eLearning

Posted by naag at June 19, 2016
Breaking Down Cloud Security

Breaking Down Cloud Security
June 2016 | MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1h 49m | 258 MB
Genre: eLearning | Language: English

In this course, you will be learning the basics of cloud security.
Smart Collaboration: How Professionals and Their Firms Succeed by Breaking Down Silos [Audiobook]

Heidi K. Gardner, Tanya Eby (Narrator), "Smart Collaboration: How Professionals and Their Firms Succeed by Breaking Down Silos"
ISBN: n/a, ASIN: B07232X8WS | 2017 | MP3@64 kbps | ~08:24:21 | 225 MB

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide  eBooks & eLearning

Posted by roxul at May 9, 2017
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

Brian T. O′Hara and Ben Malisow, "CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide"
English | ISBN: 1119277418 | 2017 | 384 pages | PDF | 4 MB

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide  eBooks & eLearning

Posted by AlenMiler at May 3, 2017
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide by Ben Malisow
English | 27 Apr. 2017 | ASIN: B07119WHHB | 384 Pages | AZW3 | 1.68 MB

Strategies for ECG Arrhythmia Diagnosis: Breaking Down Complexity  eBooks & eLearning

Posted by interes at April 28, 2017
Strategies for ECG Arrhythmia Diagnosis: Breaking Down Complexity

Strategies for ECG Arrhythmia Diagnosis: Breaking Down Complexity by George J. Klein and MD
English | 2016 | ISBN: 194290911X | 368 pages | PDF | 27,7 MB
Breaking Down Anonymity: Digital Surveillance of Irregular Migrants in Germany and the Netherlands

Dennis Broeders, "Breaking Down Anonymity: Digital Surveillance of Irregular Migrants in Germany and the Netherlands"
English | 2009 | ISBN: 9089641599 | PDF | pages: 231 | 1.2 mb

Cloud Security Guidelines for IBM Power Systems  eBooks & eLearning

Posted by lengen at Jan. 24, 2017
Cloud Security Guidelines for IBM Power Systems

Cloud Security Guidelines for IBM Power Systems by IBM Redbooks
English | Mar. 2016 | ISBN: 0738441422 | 244 Pages | PDF | 10 MB

This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power SystemsTM. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments.

Practical Cloud Security: A Cross-Industry View  eBooks & eLearning

Posted by roxul at Dec. 8, 2016
Practical Cloud Security: A Cross-Industry View

Melvin B. Greer Jr., Kevin L. Jackson, "Practical Cloud Security: A Cross-Industry View"
English | ISBN: 1498729436 | 2016 | 260 pages | EPUB | 3 MB

Learning Path: Network and Cloud Security  eBooks & eLearning

Posted by FenixN at Nov. 30, 2016
Learning Path: Network and Cloud Security

Learning Path: Network and Cloud Security
HDRips | MP4/AVC, ~270 kb/s | 1280x720 | Duration: 35 hours | English: AAC, 128 kb/s (2 ch) | 9.15 GB
Genre: Development / Programming / Secutrity

If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.

Lynda - Cloud Computing: Cloud Security  eBooks & eLearning

Posted by U.N.Owen at Nov. 3, 2016
Lynda - Cloud Computing: Cloud Security

Lynda - Cloud Computing: Cloud Security
Size: 179 MB | Duration: 1h 19m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Beginner | Language: English

Understand the basics of cloud security, including security levels, services available, and selection criteria.