Catalog Search Results
Author
Description
"It was the Orwellian year of 1984, when Stewart Brand, originator of the Whole Earth Catalog, and Larry Brilliant, a philanthropic doctor, created The Whole Earth 'Lectric Link, or The Well. Yet, rather than heralding Big Brother, it soon became a liberating cultural innovation that has helped change our world. A balky VAX computer and a rack of modems in ramshackle offices in Sausalito, California, The Well provided a place in the virtual world...
Author
Description
"The Internet is a tremendous worldwide strategic resource that has rapidly become a business necessity. Internet Technologies at Work introduces the fundamental Internet concepts and skills needed by all IT professionals. Covering all the objectives of the Certified Internet Webmaster Foundations Exam, this text covers everything from Internet applications, such as email, Web browsers, and ecommerce, to Web design, networking fundamentals, Internet...
Author
Description
Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.
Author
Description
A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of securtiy. Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who co-wrote The CISSP Prep Guide and other security bestsellers. Covers everything from basic security principles and...
Description
This course is for individuals who seek knowledge of networking on AWS beyond the foundational level. You will learn about various connectivity options including how to choose the best way to create a secure, scalable, and highly available network. You will analyze complex network design patterns and learn best practices that are ideal for your organization. Duration: 1 hour 30 minutes.--Publisher.
Description
AMS Managed AWS Landing Zone (MALZ) is a multi-account landing zone managed by AWS Managed Services (AMS). This course will walk you through how AMS configures all aspects of networking for the customer based on AMS standard templates and the options selected during onboarding. You will also learn about the benefits and constraints of multi-account landing zones. Duration: 4 hours 30 minutes.--Publisher.
Description
This course focuses on an introduction to AWS Networking. As a fundamental level course, it will provide an overview of available network services and common use cases using these services. This course includes written material, information graphics, video, and an end of course assessment. The course also includes two hands on activities to apply new learning. Duration: 2 hours.--Publisher.
15) Communications
Description
Discusses the development and possibilities of telecommunication utilizing the capabilities of computers.
Author
Description
Spotlighting the latest threats and vulnerabilities, this book is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks, equipping readers with the knowledge and techniques to successfully combat hackers. Also includes new emphasis on ethics and legal issues and readers are provided with a clear differentiation between hacking myths and hacking...
Description
Amazon GuardDuty provides visibility into security threats to help you identify and remediate anomalous or suspicious activities. This course will provide you with a fundamental understanding of the purpose, benefits, architecture, pricing philosophy, and common use cases of Amazon GuardDuty. The course also explores how the service is implemented in an AWS environment with demonstration of basic setup and usage of the service. Duration: 1 hour.--Publisher....
Description
This workshop introduces you to some of the background of threat modeling and why to do it, as well as some of the tools and techniques for modeling systems, identifying threats, and selecting mitigations. The workshop guides you through the process of creating a system model and corresponding threat model. Then you assess the usefulness of these models. Each exercise has step-by-step instructions and you can use the associated participant workbook...
Description
In this course you will learn to understand how Network Load Balancer works, understand technical concepts of Network Load Balancer, list typical use cases for Network Load Balancer, specify what it would take to implement Network Load Balancer in a real-world scenario, recognize the benefits of Network Load Balancer, explain the cost structure of Network Load Balancer, and show how to use Network Load Balancer from the AWS Management Console. Duration:...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request