- Table View
- List View
Office Home and Student 2010 All-in-One For Dummies
by Peter WeverkaOne-stop shopping for all the essentials of Office Home & Student 2010The Home & Student version of Microsoft Office is ideal for anyone who needs the essential Office applications and can do without tools like Access and Outlook. The version includes Word, Excel, PowerPoint, and OneNote. Each minibook offers straightforward advice, helpful projects, and real-world examples that target the home and student audiences. You'll benefit from instructions for creating a resume in Word, establishing a home budget in Excel, jazzing up a school presentation with PowerPoint, and taking notes in OneNote.Targets home and school users of Office 2010, who primarily need and use Word, Excel, PowerPoint, and OneNoteDemonstrates common, everyday projects, such as creating a cover letter in Word and creating reusable templates in ExcelWalks you through spiffing up a school presentation with PowerPointOffers straightforward instructions for taking notes in OneNoteReviews common Office 2010 tools and details the basics of the Office ribbonOffice Home & Student 2010 All-in-One For Dummies is your fun and friendly guide to the essentials of Office 2010!
Office Made Easy: Increase Your Productivity (Computers Made Easy)
by James BernsteinLearn How to Use Microsoft Office With This Easy to Follow Step by Step Guide. <p><p>Office Made Easy was written to take your overall office skills from a beginner to the next level of productivity. The book is based on Office 2016 but will apply to Office 2007-2019 since the functionality is basically the same. With this book you will get a top level understanding without a need for a complex education. This easy to use guide will help you navigate your way to becoming proficient with the Microsoft Office Suite of programs.
Office X for Macintosh: The Missing Manual
by Nan Barber Tonya Engst David ReynoldsMac OS X, Apple's super-advanced, Unix-based operating system, offers every desirable system-software feature known to humans. But without a compatible software library, the Mac of the future was doomed. Microsoft Office X for Macintosh is exactly the software suite most Mac fans were waiting for. Its four programs--Word, Excel, PowerPoint, and Entourage--have been completely overhauled to take advantage of the stunning looks and rock-like stability of Mac OS X. But this magnificent package comes without a single page of printed instructions. Fortunately, Pogue Press/O'Reilly is once again there to rescue the befuddled and overwhelmed--with Office X for Macintosh: The Missing Manual . It tackles each of the primary Office applications with depth, humor, and clarity, and provides relief for the hapless Mac user who'd rather read professionally written printed instructions than hunt through a maze of dryly written help screens. Office X for Macintosh: The Missing Manual is coauthored by a dream team of Macintosh experts: Tonya Engst, coeditor of the popular TidBITS Macintosh newsletter; David Reynolds, former executive editor of MacAddict magazine (now working at Apple); and Nan Barber, Macworld contributor and coauthor of Office 2001 for Macintosh: The Missing Manual , on which this book is based. Once again, the authors are joined by series founder David Pogue, who has closely edited the book to ensure excellence of depth, accuracy, and prose.
Office for iPad and Mac For Dummies
by Peter WeverkaThe easy way to work with Office on your iPad or Mac Are you a Mac user who isn't accustomed to working with Microsoft Office? Consider this friendly guide your go-to reference! Written in plain English and packed with easy-to-follow, step-by-step instructions, Office for iPad and Mac For Dummies walks you through every facet of Office, from installing the software and opening files to working with Word, Excel, PowerPoint, and Outlook--and beyond. Plus, you'll discover how to manage files, share content and collaborate online through social media, and find help when you need it. Two things are clear: the iPad and Microsoft Office are here to stay. Office for iPad was downloaded 27 million times in its first six weeks on the Apple app store, and Office 365 received nearly one million new subscribers in the last quarter reported. While iPads continue to dominate the enterprise with a 91% market share, the current version of Office for Mac is fully supported by Office 365 and brings Exchange support via Outlook and native compatibility with Windows Office documents. There's never been a better time to bring Office to your iPad or Mac, and this hands-on guide makes it easier than ever to get up and running fast. Take advantage of Word and its many features and tools Make impressive PowerPoint presentations using your Mac or iPad Use Excel to refine worksheets for data analysis and reporting Email with Outlook on a Mac or iPad If you're an Apple enthusiast who wants to get the most out of Microsoft Office, Office for iPad and Mac For Dummies shows you how simplifying and organizing your work or personal life is just a click away.
Official ((ISC)2 Press)
by Isc ² CorporateCandidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2® Guide to the ISSAP® CBK®, Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.Newly Enhanced Design – This Guide Has It All! Only guide endorsed by (ISC)2 Most up-to-date CISSP-ISSAP CBK Evolving terminology and changing requirements for security professionals Practical examples that illustrate how to apply concepts in real-life situations Chapter outlines and objectives Review questions and answers References to free study resources Read It. Study It. Refer to It Often.Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.
Official ((ISC)2 Press)
by Joseph SteinbergThe Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the ISSMP need to demonstrate a thorough understanding of the five domains of the ISSMP Common Body of Knowledge (CBK®), along with the ability to apply this in-depth knowledge to establish, present, and govern information security programs, while demonstrating management and leadership skills.Supplying an authoritative review of key concepts and requirements, the Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition is both up to date and relevant. This book provides a comprehensive review of the five domains in the ISSMP CBK: Security Leadership and Management, Security Lifecycle Management, Security Compliance Management, Contingency Management, and Law, Ethics, and Incident Management.Numerous illustrated examples and practical exercises are included in this book to demonstrate concepts and real-life scenarios. Endorsed by (ISC)2 and compiled and reviewed by ISSMPs and industry luminaries around the world, this book provides unrivaled preparation for the exam. Earning your ISSMP is a deserving achievement that should ultimately help to enhance your career path and give you a competitive advantage.
Official ((ISC)2 Press)
by Steven HernandezHealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require various levels of protection, and the exchange of healthcare information within the industry, including relevant regulatory, compliance, and legal requirements. Numerous illustrated examples and tables are included that illustrate key concepts, frameworks, and real-life scenarios. Endorsed by the (ISC)(2) and compiled and reviewed by HCISPPs and (ISC)(2) members, this book brings together a global and thorough perspective on healthcare information security and privacy. Utilize this book as your fundamental study tool in preparation for the HCISPP certification exam.
Official ((isc)2 Press Ser.)
by R Anderson J D DewarThe (ISC) Systems Security Certified Practitioner (SSCP ) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK has quickly become the book that many of
Official ((isc)2 Press Ser.)
by Mano PaulAs the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP) is a testament to the organization's ongoing commitment to information and software security
Official ((isc)2 Press Ser.)
by Mano PaulApplication vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.
Official ((isc)2 Press Ser.)
by Patrick D. HowardSignificant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP) Common Body of Knowledge (CBK) and NIST SP 800-37, the Official
Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®
by Susan HanscheThe Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certifica
Official Google Cloud Certified Associate Cloud Engineer Study Guide
by Dan SullivanThe Only Official Google Cloud Study Guide The Official Google Cloud Certified Associate Cloud Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Engineering certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Official Google Cloud Certified Associate Cloud Engineer Study Guide is your ace in the hole for deploying and managing Google Cloud Services. • Select the right Google service from the various choices based on the application to be built • Compute with Cloud VMs and managing VMs • Plan and deploying storage • Network and configure access and security Google Cloud Platform is a leading public cloud that provides its users to many of the same software, hardware, and networking infrastructure used to power Google services. Businesses, organizations, and individuals can launch servers in minutes, store petabytes of data, and implement global virtual clouds with the Google Cloud Platform. Certified Associate Cloud Engineers have demonstrated the knowledge and skills needed to deploy and operate infrastructure, services, and networks in the Google Cloud. This exam guide is designed to help you understand the Google Cloud Platform in depth so that you can meet the needs of those operating resources in the Google Cloud.
Official Google Cloud Certified Professional Cloud Architect Study Guide
by Dan SullivanSybex's proven Study Guide format teaches Google Cloud Architect job skills and prepares you for this important new Cloud exam. The Google Cloud Certified Professional Cloud Architect Study Guide is the essential resource for anyone preparing for this highly sought-after, professional-level certification. Clear and accurate chapters cover 100% of exam objectives—helping you gain the knowledge and confidence to succeed on exam day. A pre-book assessment quiz helps you evaluate your skills, while chapter review questions emphasize critical points of learning. Detailed explanations of crucial topics include analyzing and defining technical and business processes, migration planning, and designing storage systems, networks, and compute resources. Written by Dan Sullivan—a well-known author and software architect specializing in analytics, machine learning, and cloud computing—this invaluable study guide includes access to the Sybex interactive online learning environment, which includes complete practice tests, electronic flash cards, a searchable glossary, and more. Providing services suitable for a wide range of applications, particularly in high-growth areas of analytics and machine learning, Google Cloud is rapidly gaining market share in the cloud computing world. Organizations are seeking certified IT professionals with the ability to deploy and operate infrastructure, services, and networks in the Google Cloud. Take your career to the next level by validating your skills and earning certification. Design and plan cloud solution architecture Manage and provision cloud infrastructure Ensure legal compliance and security standards Understand options for implementing hybrid clouds Develop solutions that meet reliability, business, and technical requirements The Google Cloud Certified Professional Cloud Architect Study Guide is a must-have for IT professionals preparing for certification to deploy and manage Google cloud services.
Official Google Cloud Certified Professional Data Engineer Study Guide
by Dan SullivanThe proven Study Guide that prepares you for this new Google Cloud exam The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Professional Data Engineer certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Google Cloud Certified Professional Data Engineer Study Guide is your ace in the hole for deploying and managing analytics and machine learning applications. • Build and operationalize storage systems, pipelines, and compute infrastructure • Understand machine learning models and learn how to select pre-built models • Monitor and troubleshoot machine learning models • Design analytics and machine learning applications that are secure, scalable, and highly available. This exam guide is designed to help you develop an in depth understanding of data engineering and machine learning on Google Cloud Platform.
Official: Guide to the CISSP CBK ((ISC)2 Press)
by Adam Gordon<p>As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. <p>Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.</p>
Offline
by Donna CoonerIn this e-book original, acclaimed author Donna Cooner spins a timely and gripping story of how we live our lives on -- and off -- social media.Annie Webb is constantly online. She loves following influencer accounts, DM'ing with her two best friends, Luna and Caitlin, and posting selfies with her adorable boyfriend, Jameson.Then Jameson breaks up with Annie -- online. The public humiliation is immediate and intense, and Annie is overwhelmed by the cruel comments that pour in. To help Annie cope, Luna and Caitlin make a plan: the three of them will stay off social media for a month. No posting. No scrolling. No cheating.But unplugging is much harder than they thought. And when the rest of their school finds out about their offline challenge, can the three girls keep their vow -- and their friendship?
Offline First Web Development
by Daniel SaubleDesign and implement a robust offline app experience using Sencha Touch and PouchDB About This Book * Understand the design principles behind a well-designed offline experience * Create the illusion of being online when you're really offline * Use common libraries to enhance the offline experience of mobile apps with this comprehensive guide Who This Book Is For Do you want to make your app experience more robust and delightful? Are you eager to write apps that cater to a wider audience, not just the Silicon Valley crowd? Do you need to persuade your peers that offline-first is a worthwhile development paradigm? If your answer to all or any one of these questions is yes, then this is the book is for you. Some previous coding and command-line experience would be useful, but is not required. What You Will Learn * Convince others that the offline-first paradigm is worth doing * Design the behavior of the app, taking offline, online, and the transition between those two states into account * Implement the offline/online experience that you've designed * Show the user what's happening under the hood with online/offline indicators and Good Mobile Messaging * Employ various strategies to cope with unreliable network conditions * Help the user resolve conflicts related to the "split-brain" problem * Choose intelligent defaults based on usage of the app * Use point-to-point networking to partially overcome a lack of Internet connectivity In Detail When building mobile apps, it's easy to forget about the moments when your users lack a good Internet connection. Try this: put your phone in airplane mode and open a few popular apps to see how they handle being offline. From Twitter to Pinterest to Apple Maps, some apps handle being offline better than others, but very few do it well. A poor offline experience will result in frustrated users who may stop using your app, or worse, turn to your competitor's apps. Expert or novice, this book will teach you everything you need to know about designing and building a rigorous offline app experience. By putting the offline experience first, you'll have a solid foundation to build upon, avoiding the unnecessary stress and frustration of trying to retrofit offline capabilities into your finished app. This basic principle, designing for the worst case scenario, could save you countless hours of wasted effort. Style and approach This book adopts an iterative approach to designing and building a mobile app, where each chapter builds on the one before, resulting in a fully-functional app that demonstrates the concepts taught, each one of which is explained through the use of an example.
Offline!: Der Kollaps der globalen digitalen Zivilisation
by Thomas GrüterIn der Geschichte der Menschheit entstanden und vergingen mehr als 50 Hochkulturen und Zivilisationen. Auffällig dabei: Die meisten zerfielen in nur wenigen Jahrzehnten – unmittelbar nach dem Gipfelpunkt ihrer Macht und ihres Reichtums. Kann uns das auch passieren?Heute, zu Beginn des 21. Jahrhunderts, dominiert nur eine einzige Lebensweise: die globale digitale Zivilisation. Ohne Smartphones, Computer, GPS und Suchmaschinen geht nichts mehr. Nirgendwo. Und noch immer ist der Fortschritt rasant. Hat unsere Zivilisation vielleicht schon bald ihren Höhepunkt erreicht? Das Buch trägt beunruhigende Indizien dafür zusammen – und trifft damit den Nerv der Zeit. In Europa glaubt schon heute eine Mehrheit der Menschen, dass es ihren Kindern schlechter gehen wird als ihnen.Thomas Grüter vertritt die These, dass nicht Pandemien, Supervulkane oder Sonnenstürme die größten Risiken der Menschheit sind. Vielmehr droht das komplexe Grundgerüst unsere Zivilisation seine Stabilität zu verlieren. Selbst ohne die Belastung durch Klimawandel und Bodendegradation könnte es von innen her zerfallen. In zehn Kapiteln untersucht das Buch die Risiken der modernen Informationsgesellschaft, z.B:· Wie anfällig sind die Infrastrukturen und speziell die digitale Infrastruktur?· Wie stabil ist das gespeicherte Wissen? Können medizinische und naturwissenschaftliche Erkenntnisse überhaupt wieder verloren gehen?· Muss eine Wirtschaft, die auf ständiges Wachstum und globalen Handel angewiesen ist, irgendwann kollabieren? · Wann gehen uns die Rohstoffe aus, und ist das überhaupt absehbar? · Wie sicher sind Zukunftsvorsagen?· Welche Gefahr geht von Cyberkriegen aus? · Wie könnte die Gesellschaft nach dem Ende des Internets und der Smartphones aussehen?· Was lernen wir aus dem Zerfall früherer Zivilisationen?· Mit welchen Maßnahmen können wir einen plötzlichen Zerfall der digitalen Lebensweise abfedern oder vermeiden? Spannend geschrieben und umfassend recherchiert, gibt das Buch schlüssige Antworten auf die entscheidende Frage: Wie vermeiden wir die Fehler, an denen bisher alle Zivilisationen gescheitert sind? Das Buch legt die Sollbruchstellen der globalen digitalen Zivilisation offen und weist Wege aus der Krise. Wenn die Menschheit alle anstehenden Probleme meistert, dann steht ihr irgendwann der Weg zu den Sternen offen.
Offset Lithographic Technology (4th edition)
by Kenneth F. Hird Charles E. FinleyOffset Lithographic Technology provides extensive coverage of electronic applications in all areas of printing. This edition includes in-depth coverage of electronic text generation, computer-to-plate operations, computer-controlled inking and printing, digital image generation, and electronic prepress (desktop publishing). A math and measurement chapter helps students master these important basic skills.
Oh My Goth
by Gena ShowalterA note from Jade Leighton’s journalYears ago, a tragic accident robbed me of my mother and emotions. Because I find beauty in darkness and thrive outside social norms, I’ve been labeled a “freak” at school. I know my continued apathy hurts my loved ones, but I’m not about to change. Nothing will ever hurt me again.Then I wake up in an alternate reality…and everything else has changed. Goth is in. I’m considered cool, and my archenemy—the formerly popular Mercedes—is the freak. But my real friends won’t talk to me...and the new boy is getting under my skin. As my world spins out of control, I’m desperate to return to normal. But the more time that passes, the less I’m sure what “normal” really is.
Oh, Bother: Winnie-the-Pooh is Befuddled, Too (A Smackerel-Sized Parody of Modern Life)
by Jennie EgerdieWelcome back to the Hundred Acre Wood as Winnie-the-Pooh and friends acclimate to the joys and worries of the 21st century in this heartfelt parody. The world has changed in the hundred years since A. A. Milne introduced us to Winnie-the-Pooh and his pals, but that doesn&’t mean our lovable friends haven&’t adapted to life in the twenty-first century. In this heartwarming, laugh-out-loud parody, Jennie Egerdie, author of the celebrated Frog and Toad are Doing Their Best, takes us along for some marvelous misadventures as the gang grapples with modern life&’s headaches and pesky predicaments. Like the rest of us, Pooh worries about what the dwindling bee population will do to his beloved honey, while Owl discovers how far too easily misinformation can spread online. Kanga hopes she can have a night off from raising Roo, and Eeyore is finally taking care of his mental health with the help of Dr Festinker, the neighborhood therapist (and skunk). Things may not always make sense in our world, but Winnie-the-Pooh always bounds ahead, day by day and smackeral by smackeral.
Okta Administration: Implement enterprise-grade identity and access management for on-premises and cloud apps
by Lovisa Stenbacken Stjernlof HenkJan de VriesPlan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for enhanced securitySet up, manage, and audit API access policiesBook DescriptionIAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you'll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers.Once you've understood how Okta can be used as an IAM platform, you'll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta's single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications.By the end of this Okta book, you'll have learned how to implement Okta to enhance your organization's security and be able to use this book as a reference guide for the Okta certification exam.What you will learnUnderstand different types of users in Okta and how to place them in groupsSet up SSO and MFA rules to secure your IT environmentGet to grips with the basics of end-user functionality and customizationFind out how provisioning and synchronization with applications workExplore API management, Access Gateway, and Advanced Server AccessBecome well-versed in the terminology used by IAM professionalsWho this book is forIf you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone who wishes to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary.
Old and New Media after Katrina
by Diane NegraOn the fifth anniversary of Hurricane Katrina, this book examines the television coverage of September, 2005, and the manifestation of its legacy in a range of other media forms.
Olympic-Caliber Cybersecurity: Lessons for Safeguarding the 2020 Games and Other Major Events
by Julia A. Thompson Cynthia Dion-Schwarz Nathan Ryan Erik Silfversten Giacomo Persi PaoliUnderstanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.