CBAP / CCBA : certified business analysis study guide / / Susan Weese, Terri Wagner |
Autore | Weese Susan <1961-> |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2017] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Soggetto topico |
Business analysts - Certification
Business analysts - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN | 1-119-24884-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910156177103321 |
Weese Susan <1961-> | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CBAP / CCBA : certified business analysis study guide / / Susan Weese, Terri Wagner |
Autore | Weese Susan <1961-> |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2017] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Soggetto topico |
Business analysts - Certification
Business analysts - Examinations |
ISBN | 1-119-24884-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910792662203321 |
Weese Susan <1961-> | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CBAP / CCBA : certified business analysis study guide / / Susan Weese, Terri Wagner |
Autore | Weese Susan <1961-> |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2017] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Soggetto topico |
Business analysts - Certification
Business analysts - Examinations |
ISBN | 1-119-24884-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910819529103321 |
Weese Susan <1961-> | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910271015303321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910830928003321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISA : certified information systems auditor study guide / / David Cannon, with Brian T. O'Hara and Allen Keele |
Autore | Cannon David |
Edizione | [4th ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] |
Descrizione fisica | 1 online resource (699 p.) |
Soggetto topico |
Computer security - Examinations
Information storage and retrieval systems - Security measures - Examinations Computer networks - Security measures - Examinations Management information systems - Auditing - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-05640-3
1-119-41921-2 1-119-05625-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISA: Certified Information Systems Auditor: Study Guide; Contents; Introduction; Assessment Test; Chapter 1 Secrets of a Successful Auditor; Understanding the Demand for IS Audits; Executive Misconduct; More Regulation Ahead; Basic Regulatory Objective; Governance Is Leadership; Three Types of Data Target Different Uses; Audit Results Indicate the Truth; Understanding Policies, Standards, Guidelines, and Procedures; Understanding Professional Ethics; Following the ISACA Professional Code; Preventing Ethical Conflicts; Understanding the Purpose of an Audit; Classifying General Types of Audits
Determining Differences in Audit ApproachUnderstanding the Auditor's Responsibility; Comparing Audits to Assessments; Differentiating between Auditor and Auditee Roles; Applying an Independence Test; Implementing Audit Standards; Where Do Audit Standards Come From?; Understanding the Various Auditing Standards; Specific Regulations Defining Best Practices; Audits to Prove Financial Integrity; Auditor Is an Executive Position; Understanding the Importance of Auditor Confidentiality; Working with Lawyers; Working with Executives; Working with IT Professionals; Retaining Audit Documentation Providing Good Communication and IntegrationUnderstanding Leadership Duties; Planning and Setting Priorities; Providing Standard Terms of Reference; Dealing with Conflicts and Failures; Identifying the Value of Internal and External Auditors; Understanding the Evidence Rule; Stakeholders: Identifying Whom You Need to Interview; Understanding the Corporate Organizational Structure; Identifying Roles in a Corporate Organizational Structure; Identifying Roles in a Consulting Firm Organizational Structure; Summary; Exam Essentials; Review Questions; Chapter 2 Governance Strategy Planning for Organizational ControlOverview of the IT Steering Committee; Using the Balanced Scorecard; IT Subset of the BSC; Decoding the IT Strategy; Specifying a Policy; Project Management; Implementation Planning of the IT Strategy; Using COBIT; Identifying Sourcing Locations; Conducting an Executive Performance Review; Understanding the Auditor's Interest in the Strategy; Overview of Tactical Management; Planning and Performance; Management Control Methods; Risk Management; Implementing Standards; Human Resources; System Life-Cycle Management; Continuity Planning; Insurance Overview of Business Process ReengineeringWhy Use Business Process Reengineering; BPR Methodology; Genius or Insanity?; Goal of BPR; Guiding Principles for BPR; Knowledge Requirements for BPR; BPR Techniques; BPR Application Steps; Role of IS in BPR; Business Process Documentation; BPR Data Management Techniques; Benchmarking as a BPR Tool; Using a Business Impact Analysis; BPR Project Risk Assessment; Practical Application of BPR; Practical Selection Methods for BPR; Troubleshooting BPR Problems; Understanding the Auditor's Interest in Tactical Management; Operations Management Sustaining Operations |
Record Nr. | UNINA-9910270935003321 |
Cannon David | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISA : certified information systems auditor study guide / / David Cannon, with Brian T. O'Hara and Allen Keele |
Autore | Cannon David |
Edizione | [4th ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] |
Descrizione fisica | 1 online resource (699 p.) |
Soggetto topico |
Computer security - Examinations
Information storage and retrieval systems - Security measures - Examinations Computer networks - Security measures - Examinations Management information systems - Auditing - Examinations |
ISBN |
1-119-05640-3
1-119-41921-2 1-119-05625-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISA: Certified Information Systems Auditor: Study Guide; Contents; Introduction; Assessment Test; Chapter 1 Secrets of a Successful Auditor; Understanding the Demand for IS Audits; Executive Misconduct; More Regulation Ahead; Basic Regulatory Objective; Governance Is Leadership; Three Types of Data Target Different Uses; Audit Results Indicate the Truth; Understanding Policies, Standards, Guidelines, and Procedures; Understanding Professional Ethics; Following the ISACA Professional Code; Preventing Ethical Conflicts; Understanding the Purpose of an Audit; Classifying General Types of Audits
Determining Differences in Audit ApproachUnderstanding the Auditor's Responsibility; Comparing Audits to Assessments; Differentiating between Auditor and Auditee Roles; Applying an Independence Test; Implementing Audit Standards; Where Do Audit Standards Come From?; Understanding the Various Auditing Standards; Specific Regulations Defining Best Practices; Audits to Prove Financial Integrity; Auditor Is an Executive Position; Understanding the Importance of Auditor Confidentiality; Working with Lawyers; Working with Executives; Working with IT Professionals; Retaining Audit Documentation Providing Good Communication and IntegrationUnderstanding Leadership Duties; Planning and Setting Priorities; Providing Standard Terms of Reference; Dealing with Conflicts and Failures; Identifying the Value of Internal and External Auditors; Understanding the Evidence Rule; Stakeholders: Identifying Whom You Need to Interview; Understanding the Corporate Organizational Structure; Identifying Roles in a Corporate Organizational Structure; Identifying Roles in a Consulting Firm Organizational Structure; Summary; Exam Essentials; Review Questions; Chapter 2 Governance Strategy Planning for Organizational ControlOverview of the IT Steering Committee; Using the Balanced Scorecard; IT Subset of the BSC; Decoding the IT Strategy; Specifying a Policy; Project Management; Implementation Planning of the IT Strategy; Using COBIT; Identifying Sourcing Locations; Conducting an Executive Performance Review; Understanding the Auditor's Interest in the Strategy; Overview of Tactical Management; Planning and Performance; Management Control Methods; Risk Management; Implementing Standards; Human Resources; System Life-Cycle Management; Continuity Planning; Insurance Overview of Business Process ReengineeringWhy Use Business Process Reengineering; BPR Methodology; Genius or Insanity?; Goal of BPR; Guiding Principles for BPR; Knowledge Requirements for BPR; BPR Techniques; BPR Application Steps; Role of IS in BPR; Business Process Documentation; BPR Data Management Techniques; Benchmarking as a BPR Tool; Using a Business Impact Analysis; BPR Project Risk Assessment; Practical Application of BPR; Practical Selection Methods for BPR; Troubleshooting BPR Problems; Understanding the Auditor's Interest in Tactical Management; Operations Management Sustaining Operations |
Record Nr. | UNINA-9910830399303321 |
Cannon David | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering VBA for Microsoft Office 2016 / / Richard Mansfield |
Autore | Mansfield Richard <1945-> |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] |
Descrizione fisica | 1 online resource (987 p.) |
Disciplina | 005.2768 |
Soggetto topico |
Integrated software
Business - Computer programs |
ISBN |
1-119-22540-X
1-119-22539-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover ; Title Page ; Copyright ; Contents ; Introduction; Part 1 Recording Macros and Getting Started with VBA ; Chapter 1 Recording and Running Macros in the Office Applications ; What Is VBA and What Can You Do with It?
The Difference Between Visual Basic and Visual Basic for Applications Understanding Macro Basics ; Recording a Macro ; Displaying the Developer Tab on the Ribbon ; Planning the Macro ; Starting the Macro Recorder ; Naming the Macro ; Choosing How to Run a New Macro ; Running a Macro Recording a Sample Word Macro Recording a Sample Excel Macro ; Creating a Personal Macro Workbook ; Recording the Macro ; Specifying How to Trigger an Existing Macro ; Assigning a Macro to a Quick Access Toolbar Button in Word ; Assigning a Macro to a Shortcut Key Combination Deleting a Macro The Bottom Line ; Chapter 2 Getting Started with the Visual Basic Editor ; Opening the Visual Basic Editor ; Opening the Visual Basic Editor with a Macro Selected ; Opening the Visual Basic Editor Directly ; Navigating to a Macro Using the Visual Basic Editor's Main Windows The Project Explorer ; The Object Browser ; The Code Window ; The Properties Window ; The Immediate Window ; Setting Properties for a Project ; Customizing the Visual Basic Editor ; Choosing Editor and View Preferences Choosing and Laying Out the Editor Windows |
Record Nr. | UNINA-9910798172303321 |
Mansfield Richard <1945-> | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering VBA for Microsoft Office 2016 / / Richard Mansfield |
Autore | Mansfield Richard <1945-> |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] |
Descrizione fisica | 1 online resource (987 p.) |
Disciplina | 005.2768 |
Soggetto topico |
Integrated software
Business - Computer programs |
ISBN |
1-119-22540-X
1-119-22539-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover ; Title Page ; Copyright ; Contents ; Introduction; Part 1 Recording Macros and Getting Started with VBA ; Chapter 1 Recording and Running Macros in the Office Applications ; What Is VBA and What Can You Do with It?
The Difference Between Visual Basic and Visual Basic for Applications Understanding Macro Basics ; Recording a Macro ; Displaying the Developer Tab on the Ribbon ; Planning the Macro ; Starting the Macro Recorder ; Naming the Macro ; Choosing How to Run a New Macro ; Running a Macro Recording a Sample Word Macro Recording a Sample Excel Macro ; Creating a Personal Macro Workbook ; Recording the Macro ; Specifying How to Trigger an Existing Macro ; Assigning a Macro to a Quick Access Toolbar Button in Word ; Assigning a Macro to a Shortcut Key Combination Deleting a Macro The Bottom Line ; Chapter 2 Getting Started with the Visual Basic Editor ; Opening the Visual Basic Editor ; Opening the Visual Basic Editor with a Macro Selected ; Opening the Visual Basic Editor Directly ; Navigating to a Macro Using the Visual Basic Editor's Main Windows The Project Explorer ; The Object Browser ; The Code Window ; The Properties Window ; The Immediate Window ; Setting Properties for a Project ; Customizing the Visual Basic Editor ; Choosing Editor and View Preferences Choosing and Laying Out the Editor Windows |
Record Nr. | UNINA-9910816349903321 |
Mansfield Richard <1945-> | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
PMP : project management professional exam review guide / / Kim Heldman, Vanina Mangano, Brett Feddersen |
Autore | Heldman Kim |
Edizione | [Fourth edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2018 |
Descrizione fisica | 1 online resource (433 pages) : illustrations, graphs |
Disciplina | 658.404076 |
Soggetto topico | Project management - Examinations |
ISBN |
1-119-42108-X
1-119-54920-5 1-119-42112-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910554877403321 |
Heldman Kim | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|