CCIS-IT

Title Webliographies
70-742 IDENTITY WITH WINDOWS SERVER 2016 LAB MANUAL Regan, P. (2018). Identity with Windows Server 2016 exam 70-742: Lab manual. WILEY.
IT CAREER JUMPSTART: AN INTRODUCTION TO PC HARDWARE, SOFTWARE, AND NETWORKING Alpern, N. J., Alpern, J., & Muller, R. (2012). IT career jumpstart: An introduction to PC hardware, software, and networking. John Wiley & Sons.
CWTS, CWS, AND CWT COMPLETE STUDY GUIDE: EXAMS PW0-071, CWS-100, CWT-100 Bartz, R. J. (2018). CWYTS, CWS, and CWT complete study guide: Exams PW0-071, CWS-100, CWT-100. SYBEX A Wiley Brand.
ADVANCED ANALYTICS AND AI: IMPACT, IMPLEMENTATION, AND THE FUTURE OF WORK Boobier, T. (2018). Advanced analytics and AI: Impact, implementation, and the future of work. WILEY.
COGNITIVE COMPUTING AND BIG DATA ANALYTICS Hurwitz, J., Kaufman, M., & Bowles, A. (2015). Cognitive computing and big data analytics. WILEY.
ARTIFICIAL INTELLIGENCE FOR DUMMIES Mueller, J. P., & Massaron, L. (2018). Artificial intelligence . for dummies A Wiley Brand.
ARTIFICIAL INTELLIGENCE AND BIG DATA: THE BIRTH OF A NEW INTELLIGENCE Iafrate, F. (2018). Artificial intelligence and big data: The birth of a new intelligence. iSTE; WILEY.
THE BIG DATA-DRIVEN BUSINESS: HOW TO USE BIG DATA TO WIN CUSTOMERS, BEAT COMPETITORS, AND BOOST PROFITS Glass, R., & Callahan, S. (2015). The big data-driven business: How to use big data to win customers, beat competitors, and boost profits. WILEY.
JMP CONNECTIONS: THE ART OF UTILIZING CONNECTIONS IN YOUR DATA Wubbel, J. (2018). JMP connections: The art of utilizating connections in your data. WILEY.
BUILDING RESPONSIVE DATA VISUALIZATION FOR THE WEB Hinderman, B. (2016). Building responsive data visualization for the web. WILEY.
MATHEMATICAL STRUCTURES FOR COMPUTER GRAPHICS Janke, S. J. (2015). Mathematical structures for computer graphics. WILEY.
DESIGNING THE INTERNET OF THINGS McEwen, A., & Cassimally, H. (2014). Designing the Internet of things. WILEY.
COMPUTER SECURITY 3E Gollmann, D. (2011). Computer security (3rd ed.). WILEY A John Wiley & Sons, Publication.
MANAGING THE HUMAN FACTOR IN INFORMATION SECURITY - HOW TO WIN OVER STAFF AND INFLUENCE BUSINESS MANAGERS Lacey, D. (2009). Managing the human factor in information security: How to win over staff and influence business managers. WILEY A John Wiley & Sons, Publication.
VIRTUAL & AUGMENTED REALITY FOR DUMMIES Mealy, P. (2018). Virtual & augmented reality. FOR DUMMIES A Wiley Brand.
ETHICS AND TECHNOLOGY: CONTROVERSIES, QUESTIONS, AND STRATEGIES FOR ETHICAL COMPUTING 5E Tavani, H. T. (2016). Ethics and technology: Controversies, questions, and strategies for ethical computing (5th ed.). WILEY.
PANDORA'S BOX - SOCIAL AND PROFESSIONAL ISSUES OF THE INFORMATION AGE Adams, A. A., & McCrindle, R. J. (2008). Pandora's box: Social and professional issues of the information age. John Wiley & Sons.
VIRTUAL REALITY TECHNOLOGY, SECOND EDITION Burdea, G. C., & Coiffet, P. (2003). Virtual reality technology.
(2nd Ed.) WILEY-INTERSCIENCE A John Wiley & Sons, Publication.
AN INTRODUCTION TO MULTIAGENT SYSTEMS 2E Wooldridge, M. J. (2009). An introduction to multiagent systems. (2nd Ed.) WILEY A John Wiley & Sons, Publication.
CRYPTOGRAPHY ENGINEERING: DESIGN PRINCIPLES AND PRACTICAL APPLICATIONS Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Wiley Publishing.
INVESTIGATING CRYPTOCURRENCIES: UNDERSTANDING, EXTRACTING, AND ANALYZING BLOCKCHAIN EVIDENCE Furneaux, N. (2018). Investigating cryptocurrencies: Understanding, extracting, and analyzing blockchain evidence. WILEY.
HACKING THE HACKER: LEARN FROM THE EXPERTS WHO TAKE DOWN HACKERS Grimes, R. A. (2017). Hacking the hacker: Learn from the experts who take down hackers. WILEY.
PENETRATION TESTING ESSENTIALS Oriyano, S. P. (2017). Penetration testing: Essentials. SYBEX A Wiley Brand.
APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS AND SOURCE CODE IN C 20TH ANNIVERSARY EDITION Schneier, B. (2015). Applied cryptography: Protocols, algorithms, and source code in C. (20th Anniversary Ed.) WILEY.
COMPUTER SECURITY AND CRYPTOGRAPHY Konheim, A. G. (2007). Computer security and cryptography. WILEY-INTERSCIENCE A JOHN WILEY & SONS, PUBLICATION.
CYBERSECURITY LAW Kosseff, J. (2017). Cybersecurity law. WILEY.
SECURITY AND PRIVACY IN CYBER-PHYSICAL SYSTEMS - FOUNDATIONS, PRINCIPLES, AND APPLICATIONS Song, H., Fink, G. A., & Jeschke, S. (Eds.) (2018). Security and privacy in cyber-physical systems: Foundations, principles, and applications. IEEE PRESS; WILEY.
FUNDAMENTALS OF DATABASE MANAGEMENT SYSTEMS 2ND EDITION Gillenson, M. L. (2012). Fundamentals of database management systems (2nd ed.). John Wiley & Sons.
WILEY PATHWAYS INTRODUCTION TO DATABASE MANAGEMENT, FIRST EDITION Gillenson, M. L., Ponniah, P., Kriegel, A., Trukhnov, B. M., Taylor, A. G., Powell, G., & Miller, F. (2008). Introduction to database management. WILEY.
WILEY PATHWAYS INTRODUCTION TO DATABASE MANAGEMENT PROJECT MANUAL Miller, F. (2008). Introduction to database management: Project manual. WILEY.
APPLIED PREDICTIVE ANALYTICS: PRINCIPLES AND TECHNIQUES FOR THE PROFESSIONAL DATA ANALYST Abbott, D. (2014). Applied predictive analytics: Principles and techniques for the professional data analyst. WILEY.
GRAPH ANALYSIS AND VISUALIZATION: DISCOVERING BUSINESS OPPORTUNITY IN LINKED DATA Brath, R., & Jonker, D. (2015). Graph analysis and visualization: Discovering business opportunity in linked data. WILEY.
REAL-TIME ANALYTICS: TECHNIQUES TO ANALYZE AND VISUALIZE STREAMING DATA Ellis, B. (2014). Real-time analytics: Techniques to analyze and visualize streaming data. WILEY.
DATA SCIENCE & BIG DATA ANALYTICS: DISCOVERING, ANALYZING, VISUALIZING AND PRESENTING DATA EMC Education Services. (2015). Data science & big data analytics: Discovering, analyzing, visualizing and presenting data. WILEY.
DATA SMART: USING DATA SCIENCE TO TRANSFORM INFORMATION INTO INSIGHT Foreman, J. W. (2014). Data smart: Using data science to transform information into insight. WILEY.
SPARK: BIG DATA CLUSTER COMPUTING IN PRODUCTION Ganelin, I., Orhian, E., Sasaki, K., & York, B. (2016). Spark: Big data cluster computing in production. WILEY.
DATA FLUENCY: EMPOWERING YOUR ORGANIZATION WITH EFFECTIVE DATA COMMUNICATION Gemignani, Z., Gemignan, C., Galentino, R., & Schuermann, P. (2014). Data fluency: Empowering your organization with effective data communication. WILEY.
MICROSOFT BIG DATA SOLUTIONS Jorgensen, A., Rowland-Jones, J., Welch, J., Clark, D., Price, C., & Mitchell, B. (2014). Microsoft big data solutions. WILEY.
THE DATA WAREHOUSE ETL TOOLKIT: PRACTICAL TECHNIQUES FOR EXTRACTING, CLEANING, CONFORMING, AND DELIVERING DATA Kimball, R., & Caserta, J. (2004). The data warehouse ETL toolkit: Practical techniques for extracting, cleaning, conforming, and delivering data. Wiley Publishing.
THE DATA WAREHOUSE LIFECYCLE TOOLKIT, SECOND EDITION Kimball, R., Ross, M., Thornthwaite, W., Mundy, J., & Becker, B. (2008). The data warehouse lifecycle toolkit (2nd ed.). Wiley Publishing.
THE DATA WAREHOUSE TOOLKIT, THIRD EDITION: THE DEFINITIVE GUIDE TO DIMENSIONAL MODELING Kimball, R., & Ross, M. (2013). The data warehouse toolkit: The definitive guide to dimensional modeling (3rd ed.). WILEY.
THE KIMBALL GROUP READER: RELENTLESSLY PRACTICAL TOOLS FOR DATA WAREHOUSING AND BUSINESS INTELLIGENCE, 2ND EDITION Kimball, R., Ross, M., Becker, B., Mundy, J., & Thornthwaite, W. (2016). The Kimball Group reader: Relentlessly practical tools for data warehousing and business intelligence. WILEY.
DATA MINING TECHNIQUES, THIRD EDITION: FOR MARKETING, SALES, AND CUSTOMER RELATIONSHIP MANAGEMENT Linoff, G. S., & Berry, M. J. A. (2011). Data mining techniques: For marketing, sales, and customer relationship management (3rd ed.). Wiley Publishing.
PROFESSIONAL HADOOP SOLUTIONS Lublinsky, B., Smith, K. T., & Yakubovich, A. (2013). Professional Hadoop solutions. wrox A Wiley Brand.
SPSS STATISTICS FOR DATA ANALYSIS AND VISUALIZATION McCormick, K., Salcedo, J., Peck, J., & Wheeler, A. (2017). SPSS statistics for data analysis and visualization. WILEY.
DATA SCIENCE FOR DUMMIES 2ND EDITION Pierson, L. (2017). Data science (2nd ed.). for dummies A Wiley Brand.
A MANAGER'S GUIDE TO DATA WAREHOUSING Reeves, L. L. (2009). A manager's guide to data warehousing. Wiley Publishing.
BIG DATA MBA: DRIVING BUSINESS STRATEGIES WITH DATA SCIENCE Schmarzo, B. (2016). Big data MBA: Driving business strategies with data science. WILEY.
BIG DATA: UNDERSTANDING HOW DATA POWERS BIG BUSINESS Schmarzo, B. (2013). Big data: Understanding how data powers big business.
GOOGLE BIGQUERY ANALYTICS Tigani, J., & Naidu, S. (2014). Google BigQuery analytics. WILEY.
MASTER DATA MANAGEMENT & SEMANTIC MODELING - MDM Bonnet, P. (2010). Enterprise data governance: Reference & master data management, semantic modeling. iSTE; WILEY.
DISCOVERING KNOWLEDGE IN DATA: AN INTRODUCTION TO DATA MINING, SECOND EDITION Larose, D. T., & Larose, C. D. (2014). Discovering knowledge in data: An introduction to data mining (2nd ed.). WILEY.
DATA MINING AND PREDICTIVE ANALYTICS, 2ND EDITION Larose, D. T., & Larose, C. D. (2015). Data mining and predictive analytics (2nd ed.).
DATA MODELING FUNDAMENTALS: A PRACTICAL GUIDE FOR IT PROFESSIONALS Ponniah, P. (2007). Data modeling fundamentals: A practical guide for IT professionals. WILEY-INTERSCIENCE A JOHN WILEY & SONS, PUBLICATION.
DATA WAREHOUSING FUNDAMENTALS FOR IT PROFESSIONALS, SECOND EDITION Ponniah, P. (2010). Data warehousing fundamentals for IT professionals (2nd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION.
EXAM 98-364 MTA DATABASE ADMINISTRATION FUNDAMENTALS Microsoft Official Academic Course. (2012). Database fundamentals, exam 98-364. WILEY.
DATABASE DESIGN AND IMPLEMENTATION Sciore, E. (2009). Database design and implementation. John Wiley & Sons.
COMPTIA IT FUNDAMENTALS STUDY GUIDE (EXAM FC0-U51) Docter, Q. (2015). CompTIA IT fundamentals: Study guide. SYBEX A Wiley Brand.
PRINCE2 STUDY GUIDE 2017 UPDATE Hinde, D. (2018). Prince2: study guide (2nd ed.). SYBEX A Wiley Brand.
COMPUTING FUNDAMENTALS: INTRODUCTION TO COMPUTERS Wempen, F., Hattersley, R., Millett, R., & Shoup, K. (2015). Computing fundamentals: Introduction to computers. WILEY.
ENTERPRISE SECURITY - IT SECURITY SOLUTIONS, CONCEPTS, PRACTICAL EXPERIENCES, TECHNOLOGIES Fumy, W., & Sauerbrey, J. (Eds.) (2006). Enterprise security: IT security solutions: Concepts, practical experiences, technologies. Publicis Publishing.
YOUR PROJECT MANAGEMENT COACH: BEST PRACTICES FOR MANAGING PROJECTS IN THE REAL WORLD Biafore, B., & Stover, T. (2012). Your project management coach: Best practices for managing projects in the real world. John Wiley & Sons.
GETTING AN IT HELP DESK JOB FOR DUMMIES Regas, T. (2015). Getting an IT help desk job. FOR DUMMIES A Wiley Brand.
HOW SOCIETIES EMBRACE INFORMATION TECHNOLOGY: LESSONS FOR MANAGEMENT AND THE REST OF US Cortada, J. W. (2009). How societies embrace information technology: Lessons for management and the rest of us. IEEE computer society; WILEY A JOHN WILEY & SONS, PUBLICATION.
THE IMAGE-INTERFACE: GRAPHICAL SUPPORTS FOR VISUAL INFORMATION Reyes-Garcia, E. (2017). The image-interface: Graphical supports for visual information. (Vol. 3) iSTE; WILEY.
CYBER-RISK INFORMATICS: ENGINEERING EVALUATION WITH DATA SCIENCE Sahinoglu, M. (2016). Cyber-risk informatics: Engineering evaluation with data science. WILEY.
INFORMATION WARFARE Ventre, D. (2009). Information warfare. iSTE; WILEY.
MTA SECURITY FUNDAMENTALS 2ND EDITION Microsoft Official Academic Course. (2017). Security fundamentals, exam 98‐367. WILEY.
INFORMATION SECURITY AND IT RISK MANAGEMENT Agrawal, M., Campoe, A., & Pierce, E. (2014). Information security and IT risk management. WILEY.
(WCS ASIA) FUNDAMENTAL OF BUSINESS DATA COMMUNICATIONS, 13E_ASIA Dennis, A., Durcikova , A., & Fitzgerald, J. (2018). Fundamentals of business data communications (13th ed.). Wiley Custom.
FUNDAMENTALS OF BUSINESS DATA COMMUNICATIONS, ELEVENTH EDITION INTERNATIONAL STUDENT VERSION Dennis, A., & Durcikova, A. (2012). Fundamentals of business data communications (11th ed.). JOHN WILEY & SONS.
THE BROWSER HACKER'S HANDBOOK Alcorn, W., Frichot, C., & Orru, M. (2014). The browser hacker's handbook.
ADVANCED PENETRATION TESTING: HACKING THE WORLD'S MOST SECURE NETWORKS Allsopp, W. (2017). Advanced penetration testing: Hacking the world's most secure networks. WILEY.
SECURITY ENGINEERING: A GUIDE TO BUILDING DEPENDABLE DISTRIBUTED SYSTEMS, SECOND EDITION Anderson, R. J. (2008). Security engineering: A guide to building dependable distributed systems (2nd ed.). Wiley Publishing.
VCP5-DCV: VMWARE CERTIFIED PROFESSIONAL-DATA CENTER VIRTUALIZATION ON VSPHERE 5.5 STUDY GUIDE: VCP-550 Atkinson, B. (2014). VCP5-DCV VMware certified professional-data center virtualization on vSphere 5.5: Study guide: VCP-550. SYBEX A Wiley Brand.
COMPUTER SECURITY HANDBOOK, SIXTH EDITION SET Bosworth, S., Kabay, M. E., & Whyne, E. (Eds.) (2014). Computer security handbook. (6th Ed., Vol. 1) WILEY.
COMPTIA LINUX+ POWERED BY LINUX PROFESSIONAL INSTITUTE STUDY GUIDE, THIRD EDITION, EXAM LX0-103 AND EXAM LX0-104 Bresnahan, C., & Blum, R. (2015). CompTIA Linux+ powered by Linux Professional institute study guide: Exam LX0-103 and exam LX0-104 (3rd ed.). SYBEX A Wiley Brand.
LPIC-1: LINUX PROFESSIONAL INSTITUTE CERTIFICATION STUDY GUIDE, FOURTH EDITION (EXAMS 101 AND 102) Bresnahan, C., & Blum, R. (2015). LPIC-1: Linux Professional Institute Certification study guide: Exams 101-400 and 102-400 (4th ed.). SYBEX A Wiley Brand.
LPIC-2: LINUX PROFESSIONAL INSTITUTE CERTIFICATION STUDY GUIDE, 2E (EXAM 201 AND EXAM 202) Bresnahan, C., & Blum, R. (2016). LPIC-2 Linux Professional Institute Certification: Study guide exam 201 and exam 202 (2nd ed.). SYBEX A Wiley Brand.
WIRESHARK FOR SECURITY PROFESSIONALS: USING WIRESHARK AND THE METASPLOIT FRAMEWORK Bullock, J., & Parker, J. T. (2017). Wireshark for security professionals: Using Wireshark and the Metasploit framework. WILEY.
CISA: CERTIFIED INFORMATION SYSTEMS AUDITOR STUDY GUIDE, FOURTH EDITION Cannon, D., OHara, B. T., & Keele, A. (2016). CISA: Certified Information Systems Auditor: Study guide (4th ed.). SYBEX A Wiley Brand.
THE MOBILE APPLICATION HACKER'S HANDBOOK Chell, D., Erasmus, T., Colley, S., & Whitehouse, O. (2015). The mobile application hacker's handbook. WILEY.
IMPLEMENTING INTRUSION DETECTION SYSTEMS: A HANDS-ON GUIDE FOR SECURING THE NETWORK Crothers, T. (2003). Implementing intrusion detection systems: A hands-on guide for securing the network. Wiley Publishing.
ANDROID HACKER'S HANDBOOK Drake, J. J., Fora, P. O., Lanier, Z., Mulliner, C., Ridley, S. A., & Wicherski, G. (2014). Android hacker's handbook. WILEY.
LINUX ALL-IN-ONE FOR DUMMIES, 6TH EDITION Dulaney, E. (2018). Linux all-in-one (6th ed.). for dummies A Wiley Brand.
HACKING POINT OF SALE: PAYMENT APPLICATION SECRETS, THREATS, AND SOLUTIONS Gomzin, S. (2014). Hacking point of sale: Payment application secrets, threats, and solutions. WILEY.
SOCIAL ENGINEERING: THE SCIENCE OF HUMAN HACKING 2E Hadnagy, C. (2018). Social engineering: The science of human hacking (2nd ed.). WILEY.
UNMASKING THE SOCIAL ENGINEER: THE HUMAN ELEMENT OF SECURITY Hadnagy, C., & Ekman, P. (2014). Unmasking the social engineer: The human element of security. WILEY.
THE ART OF MEMORY FORENSICS: DETECTING MALWARE AND THREATS IN WINDOWS, LINUX, AND MAC MEMORY Ligh, M. H., Case, A., Levy, J., & Walters, A. (2014). The art of memory forensics: Detecting malware and threats in Windows, Linux, and Mac memory. WILEY.
PREDICTING MALICIOUS BEHAVIOR: TOOLS AND TECHNIQUES FOR ENSURING GLOBAL SECURITY WITH DVD Jackson, G. M. (2012). Predicting malicious behavior: Tools and techniques for ensuring global security. John Wiley & Sons.
DATA-DRIVEN SECURITY: ANALYSIS, VISUALIZATION AND DASHBOARDS Jacobs, J., & Rudis, B. (2014). Data-driven security: Analysis, visualization and dashboards. WILEY.
THE ANTIVIRUS HACKER'S HANDBOOK Koret, J., & Bachaalany, E. (2015). The antivirus hacker's handbook. WILEY.
GROUP POLICY: FUNDAMENTALS, SECURITY, AND THE MANAGED DESKTOP, 3RD EDITION Moskowitz, J. (2015). Group policy: Fundamentals, security, and the managed desktop (3rd ed.). SYBEX A Wiley Brand.
CYBERSECURITY: MANAGING SYSTEMS, CONDUCTING TESTING, AND INVESTIGATING INTRUSIONS Mowbray, T. J. (2014). Cybersecurity: Managing systems, conducting testing, and investigating intrusions. WILEY.
WEB COMMERCE SECURITY DESIGN AND DEVELOPMENT Nahari, H., & Krutz, R. L. (2011). Web commerce security: Design and development. Wiley Publishing.
CCSP (ISC)2 CERTIFIED CLOUD SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE O'Hara, B. T., & Malisow, B. (2017). CCSP® (ISC)2® certified cloud security professional: Official study guide. SYBEX A Wiley Brand.
VIRTUALIZATION ESSENTIALS, SECOND EDITION Portnoy, M. (2016). Virtualization: Essentials (2nd ed.). SYBEX A Wiley Brand.
DESIGNING SECURITY ARCHITECTURE SOLUTIONS Ramachandran, J. (2002). Designing security architecture solutions. Wiley Computer Publishing John Wiley & Sons.
VCA-DCV: VMWARE CERTIFIED ASSOCIATE-DATA CENTER VIRTUALIZATION ON VSPHERE STUDY GUIDE: VCAD-510 Schmidt, R., & Charlton, D. (2015). VCA-DCV VMware certified associate-data center virtualization on vSphere: Study guide. SYBEX A Wiley Brand.
CARRY ON: SOUND ADVICE FROM SCHNEIER ON SECURITY Schneier, B. (2014). Carry on: Sound advice from schneier on security. WILEY.
LIARS AND OUTLIERS: ENABLING THE TRUST THAT SOCIETY NEEDS TO THRIVE Schneier, B. (2012). Liars and outliers: Enabling the trust that society needs to thrive. John Wiley & Sons.
THE CLOUD ADOPTION PLAYBOOK: PROVEN STRATEGIES FOR TRANSFORMING YOUR ORGANIZATION WITH THE CLOUD Abdula, M., Averdunk, I., Barcia, R., Brown, K., & Emuchay, N. (2018). The cloud adoption playbook: Proven strategies for transforming your organization with the cloud. WILEY.
OPENSTACK CLOUD APPLICATION DEVELOPMENT Adkins, S., Belamaric, J., Giersch, V., Makogon, D., & Robinson, J. (2016). OpenStack cloud application development. wrox A Wiley Brand.
AWS CERTIFIED SOLUTIONS ARCHITECT OFFICIAL STUDY GUIDE - ASSOCIATE EXAM Baron, J., Baz, H., Bixler, T., Gaut, B., Kelly, K. E., Senior, S., & Stamper, J. (2017). AWS certified solutions architect official: Study guide - associate exam. SYBEX A Wiley Brand.
VMWARE VSPHERE POWERCLI REFERENCE, 2ND EDITION: AUTOMATING VSPHERE ADMINISTRATION Dekens, L., Medd, J., Graf, B., Sizemore, G., Sullivan, A., & Boren, M. (2016). VMware vSphere powerCLI reference (2nd ed.). SYBEX A Wiley Brand.
WINDOWS AZURE HYBRID CLOUD Garber, D., Mlik, J., & Fazio, A. (2013). Windows Azure hybrid cloud. wrox A Wiley Brand.
VMWARE SOFTWARE-DEFINED STORAGE: A DESIGN GUIDE TO THE POLICY-DRIVEN, SOFTWARE-DEFINED STORAGE ERA Hosken, M. (2016). Vmware software-defined storage: A design guide to the policy-driven, software-defined storage era. SYBEX A Wiley Brand.
MASTERING VMWARE VSPHERE 6 Marshall, N., Orchard, G., & Atwell, J. (2015). Mastering VMware vSphere® 6. SYBEX A Wiley Brand.
CCNA CLOUD COMPLETE STUDY GUIDE: EXAM 210-451 AND EXAM 210-455 Montgomery, T., & Olson, S. (2018). CCNA cloud complete study guide: Exam 210-451 and exam 210-455. SYBEX A Wiley Brand.
DEPLOYING AND MANAGING A CLOUD INFRASTRUCTURE: REAL WORLD SKILLS FOR THE COMPTIA CLOUD+ CERTIFICATION AND BEYOND: CV0-001 Gilani, Z., Salam, A., & Haq, S. U. (2015). Deploying and managing a cloud infrastructure: Real world skills for the CompTIA Cloud+ certification and beyond. SYBEX A Wiley Brand.
MASTERING HYPER-V 2012 R2 WITH SYSTEM CENTER AND WINDOWS AZURE Savill, J. (2014). Mastering Hyper-V 2012 R2 with system center and Windows Azure. SYBEX A Wiley Brand.
SWIFT IN THE CLOUD Williamson, L., Ponzo, J., Bohrer, P., Olivieri, R., Weinmeister, K., & Kallner, S. (2017). Swift in the cloud. WILEY.
CLOUD COMPUTING PRINCIPLES AND PARADIGMS Buyya, R., Broberg, J., & Gościński, A. (Eds.) (2011). Cloud computing: Principles and paradigms. WILEY A JOHN WILEY & SONS, PUBLICATION.
CLOUD COMPUTING: BUSINESS TRENDS AND TECHNOLOGIES Faynberg, I., Lu, H., & Skuler, D. (2016). Cloud computing: Business trends and technologies. WILEY.
BIG-DATA ANALYTICS FOR CLOUD, IOT AND COGNITIVE COMPUTING Hwang, K., & Chen, M. (2017). Big-data analytics for cloud, IoT and cognitive computing. WILEY.
CLOUD COMPUTING AND VIRTUALIZATION Le, D., Kumar, R., Nguyen, G. N., & Chatterjee, J. M. (2018). Cloud computing and virtualization. Scrivener Publishing; WILEY.
DISTRIBUTED DATABASE MANAGEMENT SYSTEMS: A PRACTICAL APPROACH Rahimi, S. K., & Haug, F. S. (2010). Distributed database management systems: A practical approach. IEEE computer society; WILEY A JOHN WILEY & SONS, PUBLICATION.
MANAGING THE TESTING PROCESS: PRACTICAL TOOLS AND TECHNIQUES FOR MANAGING HARDWARE AND SOFTWARE TESTING, THIRD EDITION Black, R. (2009). Managing the testing process: Practical tools and techniques for managing hardware and software testing (3rd ed.). Wiley Publishing.
Back to Top