Shop

$15.00
XML/JSON Explanation-SYM 408
$15.00
XML Basics Application-SYM 408
$7.00
Techniques for Storing JavaScript Object Notation-SYM 408
$8.00
Querying Against Attribute Values Vs. Element Values-SYM 408
$12.00
Use MongoDB to Create and Manage Hotel Documents-SYM 408
$8.00
Single Collections Vs. Embedded Documents in NoSQL Databases
$7.00
Differences Between Relational Databases and NoSQL Databases
$10.00
Design a Schema-SYM 408
$12.00
Design a Relational Schema-SYM 408
$7.00
Comparison of Data Warehouse Architectures-SYM 408
$7.00
Differences Between Surrogate Keys and Natural Keys-SYM 408
$12.00
Security Automation With PowerShell-ITT 430
$7.00
How PowerShell Automation Integrates with Other Tools-ITT 430
$6.00
Key Benefits of Using PowerShell Automation-ITT 430
$10.00
Developing Contingency Strategies for Information System-ITT 430
$5.00
Readiness of Staff to Implement Business Continuity Plan-ITT 430
$6.00
Main aspects of an ideal Business Continuity Plan-ITT 430
$12.00
Evaluating Framework Alignment-ITT 430
$7.00
How to Gauge the Success of a Cybersecurity Framework-ITT 430
$5.00
Cybersecurity Frameworks Impact on Communication-ITT 430
$12.00
Risk Management Assessment and Control-ITT 430
$7.00
Evaluating Cybersecurity Risk Management Programs-ITT 430
$7.00
How to Effectively Communicate Cybersecurity Risks-ITT 430
$10.00
Benchmark – Security Program Roadmap Presentation-ITT 430
$5.00
A security Program to Changing Threat Landscapes-ITT 430
$6.00
Leadership Role in Developing a IT Security Program-ITT 430
$12.00
Writing An Information System Security Policy-ITT 430
$12.00
Benchmark-Applying Advanced Protocols-ITT 430
$7.00
Developing a Comprehensive IT Security Policy-ITT 430
$7.00
Most Important Advances in Server Protocols-ITT 430