70-742 IDENTITY WITH WINDOWS SERVER 2016 LAB MANUAL |
Regan, P. (2018). Identity with Windows Server 2016 exam 70-742: Lab manual. WILEY. |
IT CAREER JUMPSTART: AN INTRODUCTION TO PC HARDWARE, SOFTWARE, AND NETWORKING |
Alpern, N. J., Alpern, J., & Muller, R. (2012). IT career jumpstart: An introduction to PC hardware, software, and networking. John Wiley & Sons. |
CWTS, CWS, AND CWT COMPLETE STUDY GUIDE: EXAMS PW0-071, CWS-100, CWT-100 |
Bartz, R. J. (2018). CWYTS, CWS, and CWT complete study guide: Exams PW0-071, CWS-100, CWT-100. SYBEX A Wiley Brand. |
ADVANCED ANALYTICS AND AI: IMPACT, IMPLEMENTATION, AND THE FUTURE OF WORK |
Boobier, T. (2018). Advanced analytics and AI: Impact, implementation, and the future of work. WILEY. |
COGNITIVE COMPUTING AND BIG DATA ANALYTICS |
Hurwitz, J., Kaufman, M., & Bowles, A. (2015). Cognitive computing and big data analytics. WILEY. |
ARTIFICIAL INTELLIGENCE FOR DUMMIES |
Mueller, J. P., & Massaron, L. (2018). Artificial intelligence . for dummies A Wiley Brand. |
ARTIFICIAL INTELLIGENCE AND BIG DATA: THE BIRTH OF A NEW INTELLIGENCE |
Iafrate, F. (2018). Artificial intelligence and big data: The birth of a new intelligence. iSTE; WILEY. |
THE BIG DATA-DRIVEN BUSINESS: HOW TO USE BIG DATA TO WIN CUSTOMERS, BEAT COMPETITORS, AND BOOST PROFITS |
Glass, R., & Callahan, S. (2015). The big data-driven business: How to use big data to win customers, beat competitors, and boost profits. WILEY. |
JMP CONNECTIONS: THE ART OF UTILIZING CONNECTIONS IN YOUR DATA |
Wubbel, J. (2018). JMP connections: The art of utilizating connections in your data. WILEY. |
BUILDING RESPONSIVE DATA VISUALIZATION FOR THE WEB |
Hinderman, B. (2016). Building responsive data visualization for the web. WILEY. |
MATHEMATICAL STRUCTURES FOR COMPUTER GRAPHICS |
Janke, S. J. (2015). Mathematical structures for computer graphics. WILEY. |
DESIGNING THE INTERNET OF THINGS |
McEwen, A., & Cassimally, H. (2014). Designing the Internet of things. WILEY. |
COMPUTER SECURITY 3E |
Gollmann, D. (2011). Computer security (3rd ed.). WILEY A John Wiley & Sons, Publication. |
MANAGING THE HUMAN FACTOR IN INFORMATION SECURITY - HOW TO WIN OVER STAFF AND INFLUENCE BUSINESS MANAGERS |
Lacey, D. (2009). Managing the human factor in information security: How to win over staff and influence business managers. WILEY A John Wiley & Sons, Publication. |
VIRTUAL & AUGMENTED REALITY FOR DUMMIES |
Mealy, P. (2018). Virtual & augmented reality. FOR DUMMIES A Wiley Brand. |
ETHICS AND TECHNOLOGY: CONTROVERSIES, QUESTIONS, AND STRATEGIES FOR ETHICAL COMPUTING 5E |
Tavani, H. T. (2016). Ethics and technology: Controversies, questions, and strategies for ethical computing (5th ed.). WILEY. |
PANDORA'S BOX - SOCIAL AND PROFESSIONAL ISSUES OF THE INFORMATION AGE |
Adams, A. A., & McCrindle, R. J. (2008). Pandora's box: Social and professional issues of the information age. John Wiley & Sons. |
VIRTUAL REALITY TECHNOLOGY, SECOND EDITION |
Burdea, G. C., & Coiffet, P. (2003). Virtual reality technology. (2nd Ed.) WILEY-INTERSCIENCE A John Wiley & Sons, Publication. |
AN INTRODUCTION TO MULTIAGENT SYSTEMS 2E |
Wooldridge, M. J. (2009). An introduction to multiagent systems. (2nd Ed.) WILEY A John Wiley & Sons, Publication.
|
CRYPTOGRAPHY ENGINEERING: DESIGN PRINCIPLES AND PRACTICAL APPLICATIONS |
Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Wiley Publishing. |
INVESTIGATING CRYPTOCURRENCIES: UNDERSTANDING, EXTRACTING, AND ANALYZING BLOCKCHAIN EVIDENCE |
Furneaux, N. (2018). Investigating cryptocurrencies: Understanding, extracting, and analyzing blockchain evidence. WILEY. |
HACKING THE HACKER: LEARN FROM THE EXPERTS WHO TAKE DOWN HACKERS |
Grimes, R. A. (2017). Hacking the hacker: Learn from the experts who take down hackers. WILEY. |
PENETRATION TESTING ESSENTIALS |
Oriyano, S. P. (2017). Penetration testing: Essentials. SYBEX A Wiley Brand. |
APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS AND SOURCE CODE IN C 20TH ANNIVERSARY EDITION |
Schneier, B. (2015). Applied cryptography: Protocols, algorithms, and source code in C. (20th Anniversary Ed.) WILEY. |
COMPUTER SECURITY AND CRYPTOGRAPHY |
Konheim, A. G. (2007). Computer security and cryptography. WILEY-INTERSCIENCE A JOHN WILEY & SONS, PUBLICATION. |
CYBERSECURITY LAW |
Kosseff, J. (2017). Cybersecurity law. WILEY. |
SECURITY AND PRIVACY IN CYBER-PHYSICAL SYSTEMS - FOUNDATIONS, PRINCIPLES, AND APPLICATIONS |
Song, H., Fink, G. A., & Jeschke, S. (Eds.) (2018). Security and privacy in cyber-physical systems: Foundations, principles, and applications. IEEE PRESS; WILEY. |
FUNDAMENTALS OF DATABASE MANAGEMENT SYSTEMS 2ND EDITION |
Gillenson, M. L. (2012). Fundamentals of database management systems (2nd ed.). John Wiley & Sons. |
WILEY PATHWAYS INTRODUCTION TO DATABASE MANAGEMENT, FIRST EDITION |
Gillenson, M. L., Ponniah, P., Kriegel, A., Trukhnov, B. M., Taylor, A. G., Powell, G., & Miller, F. (2008). Introduction to database management. WILEY. |
WILEY PATHWAYS INTRODUCTION TO DATABASE MANAGEMENT PROJECT MANUAL |
Miller, F. (2008). Introduction to database management: Project manual. WILEY. |
APPLIED PREDICTIVE ANALYTICS: PRINCIPLES AND TECHNIQUES FOR THE PROFESSIONAL DATA ANALYST |
Abbott, D. (2014). Applied predictive analytics: Principles and techniques for the professional data analyst. WILEY. |
GRAPH ANALYSIS AND VISUALIZATION: DISCOVERING BUSINESS OPPORTUNITY IN LINKED DATA |
Brath, R., & Jonker, D. (2015). Graph analysis and visualization: Discovering business opportunity in linked data. WILEY. |
REAL-TIME ANALYTICS: TECHNIQUES TO ANALYZE AND VISUALIZE STREAMING DATA |
Ellis, B. (2014). Real-time analytics: Techniques to analyze and visualize streaming data. WILEY. |
DATA SCIENCE & BIG DATA ANALYTICS: DISCOVERING, ANALYZING, VISUALIZING AND PRESENTING DATA |
EMC Education Services. (2015). Data science & big data analytics: Discovering, analyzing, visualizing and presenting data. WILEY. |
DATA SMART: USING DATA SCIENCE TO TRANSFORM INFORMATION INTO INSIGHT |
Foreman, J. W. (2014). Data smart: Using data science to transform information into insight. WILEY. |
SPARK: BIG DATA CLUSTER COMPUTING IN PRODUCTION |
Ganelin, I., Orhian, E., Sasaki, K., & York, B. (2016). Spark: Big data cluster computing in production. WILEY. |
DATA FLUENCY: EMPOWERING YOUR ORGANIZATION WITH EFFECTIVE DATA COMMUNICATION |
Gemignani, Z., Gemignan, C., Galentino, R., & Schuermann, P. (2014). Data fluency: Empowering your organization with effective data communication. WILEY. |
MICROSOFT BIG DATA SOLUTIONS |
Jorgensen, A., Rowland-Jones, J., Welch, J., Clark, D., Price, C., & Mitchell, B. (2014). Microsoft big data solutions. WILEY. |
THE DATA WAREHOUSE ETL TOOLKIT: PRACTICAL TECHNIQUES FOR EXTRACTING, CLEANING, CONFORMING, AND DELIVERING DATA |
Kimball, R., & Caserta, J. (2004). The data warehouse ETL toolkit: Practical techniques for extracting, cleaning, conforming, and delivering data. Wiley Publishing. |
THE DATA WAREHOUSE LIFECYCLE TOOLKIT, SECOND EDITION |
Kimball, R., Ross, M., Thornthwaite, W., Mundy, J., & Becker, B. (2008). The data warehouse lifecycle toolkit (2nd ed.). Wiley Publishing. |
THE DATA WAREHOUSE TOOLKIT, THIRD EDITION: THE DEFINITIVE GUIDE TO DIMENSIONAL MODELING |
Kimball, R., & Ross, M. (2013). The data warehouse toolkit: The definitive guide to dimensional modeling (3rd ed.). WILEY. |
THE KIMBALL GROUP READER: RELENTLESSLY PRACTICAL TOOLS FOR DATA WAREHOUSING AND BUSINESS INTELLIGENCE, 2ND EDITION |
Kimball, R., Ross, M., Becker, B., Mundy, J., & Thornthwaite, W. (2016). The Kimball Group reader: Relentlessly practical tools for data warehousing and business intelligence. WILEY. |
DATA MINING TECHNIQUES, THIRD EDITION: FOR MARKETING, SALES, AND CUSTOMER RELATIONSHIP MANAGEMENT |
Linoff, G. S., & Berry, M. J. A. (2011). Data mining techniques: For marketing, sales, and customer relationship management (3rd ed.). Wiley Publishing. |
PROFESSIONAL HADOOP SOLUTIONS |
Lublinsky, B., Smith, K. T., & Yakubovich, A. (2013). Professional Hadoop solutions. wrox A Wiley Brand. |
SPSS STATISTICS FOR DATA ANALYSIS AND VISUALIZATION |
McCormick, K., Salcedo, J., Peck, J., & Wheeler, A. (2017). SPSS statistics for data analysis and visualization. WILEY. |
DATA SCIENCE FOR DUMMIES 2ND EDITION |
Pierson, L. (2017). Data science (2nd ed.). for dummies A Wiley Brand. |
A MANAGER'S GUIDE TO DATA WAREHOUSING |
Reeves, L. L. (2009). A manager's guide to data warehousing. Wiley Publishing. |
BIG DATA MBA: DRIVING BUSINESS STRATEGIES WITH DATA SCIENCE |
Schmarzo, B. (2016). Big data MBA: Driving business strategies with data science. WILEY. |
BIG DATA: UNDERSTANDING HOW DATA POWERS BIG BUSINESS |
Schmarzo, B. (2013). Big data: Understanding how data powers big business. |
GOOGLE BIGQUERY ANALYTICS |
Tigani, J., & Naidu, S. (2014). Google BigQuery analytics. WILEY. |
MASTER DATA MANAGEMENT & SEMANTIC MODELING - MDM |
Bonnet, P. (2010). Enterprise data governance: Reference & master data management, semantic modeling. iSTE; WILEY. |
DISCOVERING KNOWLEDGE IN DATA: AN INTRODUCTION TO DATA MINING, SECOND EDITION |
Larose, D. T., & Larose, C. D. (2014). Discovering knowledge in data: An introduction to data mining (2nd ed.). WILEY. |
DATA MINING AND PREDICTIVE ANALYTICS, 2ND EDITION |
Larose, D. T., & Larose, C. D. (2015). Data mining and predictive analytics (2nd ed.). |
DATA MODELING FUNDAMENTALS: A PRACTICAL GUIDE FOR IT PROFESSIONALS |
Ponniah, P. (2007). Data modeling fundamentals: A practical guide for IT professionals. WILEY-INTERSCIENCE A JOHN WILEY & SONS, PUBLICATION. |
DATA WAREHOUSING FUNDAMENTALS FOR IT PROFESSIONALS, SECOND EDITION |
Ponniah, P. (2010). Data warehousing fundamentals for IT professionals (2nd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION. |
EXAM 98-364 MTA DATABASE ADMINISTRATION FUNDAMENTALS |
Microsoft Official Academic Course. (2012). Database fundamentals, exam 98-364. WILEY. |
DATABASE DESIGN AND IMPLEMENTATION |
Sciore, E. (2009). Database design and implementation. John Wiley & Sons. |
COMPTIA IT FUNDAMENTALS STUDY GUIDE (EXAM FC0-U51) |
Docter, Q. (2015). CompTIA IT fundamentals: Study guide. SYBEX A Wiley Brand. |
PRINCE2 STUDY GUIDE 2017 UPDATE |
Hinde, D. (2018). Prince2: study guide (2nd ed.). SYBEX A Wiley Brand. |
COMPUTING FUNDAMENTALS: INTRODUCTION TO COMPUTERS |
Wempen, F., Hattersley, R., Millett, R., & Shoup, K. (2015). Computing fundamentals: Introduction to computers. WILEY. |
ENTERPRISE SECURITY - IT SECURITY SOLUTIONS, CONCEPTS, PRACTICAL EXPERIENCES, TECHNOLOGIES |
Fumy, W., & Sauerbrey, J. (Eds.) (2006). Enterprise security: IT security solutions: Concepts, practical experiences, technologies. Publicis Publishing. |
YOUR PROJECT MANAGEMENT COACH: BEST PRACTICES FOR MANAGING PROJECTS IN THE REAL WORLD |
Biafore, B., & Stover, T. (2012). Your project management coach: Best practices for managing projects in the real world. John Wiley & Sons. |
GETTING AN IT HELP DESK JOB FOR DUMMIES |
Regas, T. (2015). Getting an IT help desk job. FOR DUMMIES A Wiley Brand. |
HOW SOCIETIES EMBRACE INFORMATION TECHNOLOGY: LESSONS FOR MANAGEMENT AND THE REST OF US |
Cortada, J. W. (2009). How societies embrace information technology: Lessons for management and the rest of us. IEEE computer society; WILEY A JOHN WILEY & SONS, PUBLICATION. |
THE IMAGE-INTERFACE: GRAPHICAL SUPPORTS FOR VISUAL INFORMATION |
Reyes-Garcia, E. (2017). The image-interface: Graphical supports for visual information. (Vol. 3) iSTE; WILEY. |
CYBER-RISK INFORMATICS: ENGINEERING EVALUATION WITH DATA SCIENCE |
Sahinoglu, M. (2016). Cyber-risk informatics: Engineering evaluation with data science. WILEY. |
INFORMATION WARFARE |
Ventre, D. (2009). Information warfare. iSTE; WILEY. |
MTA SECURITY FUNDAMENTALS 2ND EDITION |
Microsoft Official Academic Course. (2017). Security fundamentals, exam 98â€367. WILEY. |
INFORMATION SECURITY AND IT RISK MANAGEMENT |
Agrawal, M., Campoe, A., & Pierce, E. (2014). Information security and IT risk management. WILEY. |
(WCS ASIA) FUNDAMENTAL OF BUSINESS DATA COMMUNICATIONS, 13E_ASIA |
Dennis, A., Durcikova , A., & Fitzgerald, J. (2018). Fundamentals of business data communications (13th ed.). Wiley Custom. |
FUNDAMENTALS OF BUSINESS DATA COMMUNICATIONS, ELEVENTH EDITION INTERNATIONAL STUDENT VERSION |
Dennis, A., & Durcikova, A. (2012). Fundamentals of business data communications (11th ed.). JOHN WILEY & SONS. |
THE BROWSER HACKER'S HANDBOOK |
Alcorn, W., Frichot, C., & Orru, M. (2014). The browser hacker's handbook. |
ADVANCED PENETRATION TESTING: HACKING THE WORLD'S MOST SECURE NETWORKS |
Allsopp, W. (2017). Advanced penetration testing: Hacking the world's most secure networks. WILEY. |
SECURITY ENGINEERING: A GUIDE TO BUILDING DEPENDABLE DISTRIBUTED SYSTEMS, SECOND EDITION |
Anderson, R. J. (2008). Security engineering: A guide to building dependable distributed systems (2nd ed.). Wiley Publishing. |
VCP5-DCV: VMWARE CERTIFIED PROFESSIONAL-DATA CENTER VIRTUALIZATION ON VSPHERE 5.5 STUDY GUIDE: VCP-550 |
Atkinson, B. (2014). VCP5-DCV VMware certified professional-data center virtualization on vSphere 5.5: Study guide: VCP-550. SYBEX A Wiley Brand. |
COMPUTER SECURITY HANDBOOK, SIXTH EDITION SET |
Bosworth, S., Kabay, M. E., & Whyne, E. (Eds.) (2014). Computer security handbook. (6th Ed., Vol. 1) WILEY. |
COMPTIA LINUX+ POWERED BY LINUX PROFESSIONAL INSTITUTE STUDY GUIDE, THIRD EDITION, EXAM LX0-103 AND EXAM LX0-104 |
Bresnahan, C., & Blum, R. (2015). CompTIA Linux+ powered by Linux Professional institute study guide: Exam LX0-103 and exam LX0-104 (3rd ed.). SYBEX A Wiley Brand. |
LPIC-1: LINUX PROFESSIONAL INSTITUTE CERTIFICATION STUDY GUIDE, FOURTH EDITION (EXAMS 101 AND 102) |
Bresnahan, C., & Blum, R. (2015). LPIC-1: Linux Professional Institute Certification study guide: Exams 101-400 and 102-400 (4th ed.). SYBEX A Wiley Brand. |
LPIC-2: LINUX PROFESSIONAL INSTITUTE CERTIFICATION STUDY GUIDE, 2E (EXAM 201 AND EXAM 202) |
Bresnahan, C., & Blum, R. (2016). LPIC-2 Linux Professional Institute Certification: Study guide exam 201 and exam 202 (2nd ed.). SYBEX A Wiley Brand. |
WIRESHARK FOR SECURITY PROFESSIONALS: USING WIRESHARK AND THE METASPLOIT FRAMEWORK |
Bullock, J., & Parker, J. T. (2017). Wireshark for security professionals: Using Wireshark and the Metasploit framework. WILEY. |
CISA: CERTIFIED INFORMATION SYSTEMS AUDITOR STUDY GUIDE, FOURTH EDITION |
Cannon, D., OHara, B. T., & Keele, A. (2016). CISA: Certified Information Systems Auditor: Study guide (4th ed.). SYBEX A Wiley Brand. |
THE MOBILE APPLICATION HACKER'S HANDBOOK |
Chell, D., Erasmus, T., Colley, S., & Whitehouse, O. (2015). The mobile application hacker's handbook. WILEY. |
IMPLEMENTING INTRUSION DETECTION SYSTEMS: A HANDS-ON GUIDE FOR SECURING THE NETWORK |
Crothers, T. (2003). Implementing intrusion detection systems: A hands-on guide for securing the network. Wiley Publishing. |
ANDROID HACKER'S HANDBOOK |
Drake, J. J., Fora, P. O., Lanier, Z., Mulliner, C., Ridley, S. A., & Wicherski, G. (2014). Android hacker's handbook. WILEY. |
LINUX ALL-IN-ONE FOR DUMMIES, 6TH EDITION |
Dulaney, E. (2018). Linux all-in-one (6th ed.). for dummies A Wiley Brand. |
HACKING POINT OF SALE: PAYMENT APPLICATION SECRETS, THREATS, AND SOLUTIONS |
Gomzin, S. (2014). Hacking point of sale: Payment application secrets, threats, and solutions. WILEY. |
SOCIAL ENGINEERING: THE SCIENCE OF HUMAN HACKING 2E |
Hadnagy, C. (2018). Social engineering: The science of human hacking (2nd ed.). WILEY. |
UNMASKING THE SOCIAL ENGINEER: THE HUMAN ELEMENT OF SECURITY |
Hadnagy, C., & Ekman, P. (2014). Unmasking the social engineer: The human element of security. WILEY. |
THE ART OF MEMORY FORENSICS: DETECTING MALWARE AND THREATS IN WINDOWS, LINUX, AND MAC MEMORY |
Ligh, M. H., Case, A., Levy, J., & Walters, A. (2014). The art of memory forensics: Detecting malware and threats in Windows, Linux, and Mac memory. WILEY. |
PREDICTING MALICIOUS BEHAVIOR: TOOLS AND TECHNIQUES FOR ENSURING GLOBAL SECURITY WITH DVD |
Jackson, G. M. (2012). Predicting malicious behavior: Tools and techniques for ensuring global security. John Wiley & Sons. |
DATA-DRIVEN SECURITY: ANALYSIS, VISUALIZATION AND DASHBOARDS |
Jacobs, J., & Rudis, B. (2014). Data-driven security: Analysis, visualization and dashboards. WILEY. |
THE ANTIVIRUS HACKER'S HANDBOOK |
Koret, J., & Bachaalany, E. (2015). The antivirus hacker's handbook. WILEY. |
GROUP POLICY: FUNDAMENTALS, SECURITY, AND THE MANAGED DESKTOP, 3RD EDITION |
Moskowitz, J. (2015). Group policy: Fundamentals, security, and the managed desktop (3rd ed.). SYBEX A Wiley Brand. |
CYBERSECURITY: MANAGING SYSTEMS, CONDUCTING TESTING, AND INVESTIGATING INTRUSIONS |
Mowbray, T. J. (2014). Cybersecurity: Managing systems, conducting testing, and investigating intrusions. WILEY. |
WEB COMMERCE SECURITY DESIGN AND DEVELOPMENT |
Nahari, H., & Krutz, R. L. (2011). Web commerce security: Design and development. Wiley Publishing. |
CCSP (ISC)2 CERTIFIED CLOUD SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE |
O'Hara, B. T., & Malisow, B. (2017). CCSP® (ISC)2® certified cloud security professional: Official study guide. SYBEX A Wiley Brand. |
VIRTUALIZATION ESSENTIALS, SECOND EDITION |
Portnoy, M. (2016). Virtualization: Essentials (2nd ed.). SYBEX A Wiley Brand. |
DESIGNING SECURITY ARCHITECTURE SOLUTIONS |
Ramachandran, J. (2002). Designing security architecture solutions. Wiley Computer Publishing John Wiley & Sons. |
VCA-DCV: VMWARE CERTIFIED ASSOCIATE-DATA CENTER VIRTUALIZATION ON VSPHERE STUDY GUIDE: VCAD-510 |
Schmidt, R., & Charlton, D. (2015). VCA-DCV VMware certified associate-data center virtualization on vSphere: Study guide. SYBEX A Wiley Brand. |
CARRY ON: SOUND ADVICE FROM SCHNEIER ON SECURITY |
Schneier, B. (2014). Carry on: Sound advice from schneier on security. WILEY. |
LIARS AND OUTLIERS: ENABLING THE TRUST THAT SOCIETY NEEDS TO THRIVE |
Schneier, B. (2012). Liars and outliers: Enabling the trust that society needs to thrive. John Wiley & Sons. |
THE CLOUD ADOPTION PLAYBOOK: PROVEN STRATEGIES FOR TRANSFORMING YOUR ORGANIZATION WITH THE CLOUD |
Abdula, M., Averdunk, I., Barcia, R., Brown, K., & Emuchay, N. (2018). The cloud adoption playbook: Proven strategies for transforming your organization with the cloud. WILEY. |
OPENSTACK CLOUD APPLICATION DEVELOPMENT |
Adkins, S., Belamaric, J., Giersch, V., Makogon, D., & Robinson, J. (2016). OpenStack cloud application development. wrox A Wiley Brand. |
AWS CERTIFIED SOLUTIONS ARCHITECT OFFICIAL STUDY GUIDE - ASSOCIATE EXAM |
Baron, J., Baz, H., Bixler, T., Gaut, B., Kelly, K. E., Senior, S., & Stamper, J. (2017). AWS certified solutions architect official: Study guide - associate exam. SYBEX A Wiley Brand. |
VMWARE VSPHERE POWERCLI REFERENCE, 2ND EDITION: AUTOMATING VSPHERE ADMINISTRATION |
Dekens, L., Medd, J., Graf, B., Sizemore, G., Sullivan, A., & Boren, M. (2016). VMware vSphere powerCLI reference (2nd ed.). SYBEX A Wiley Brand. |
WINDOWS AZURE HYBRID CLOUD |
Garber, D., Mlik, J., & Fazio, A. (2013). Windows Azure hybrid cloud. wrox A Wiley Brand. |
VMWARE SOFTWARE-DEFINED STORAGE: A DESIGN GUIDE TO THE POLICY-DRIVEN, SOFTWARE-DEFINED STORAGE ERA |
Hosken, M. (2016). Vmware software-defined storage: A design guide to the policy-driven, software-defined storage era. SYBEX A Wiley Brand. |
MASTERING VMWARE VSPHERE 6 |
Marshall, N., Orchard, G., & Atwell, J. (2015). Mastering VMware vSphere® 6. SYBEX A Wiley Brand. |
CCNA CLOUD COMPLETE STUDY GUIDE: EXAM 210-451 AND EXAM 210-455 |
Montgomery, T., & Olson, S. (2018). CCNA cloud complete study guide: Exam 210-451 and exam 210-455. SYBEX A Wiley Brand. |
DEPLOYING AND MANAGING A CLOUD INFRASTRUCTURE: REAL WORLD SKILLS FOR THE COMPTIA CLOUD+ CERTIFICATION AND BEYOND: CV0-001 |
Gilani, Z., Salam, A., & Haq, S. U. (2015). Deploying and managing a cloud infrastructure: Real world skills for the CompTIA Cloud+ certification and beyond. SYBEX A Wiley Brand. |
MASTERING HYPER-V 2012 R2 WITH SYSTEM CENTER AND WINDOWS AZURE |
Savill, J. (2014). Mastering Hyper-V 2012 R2 with system center and Windows Azure. SYBEX A Wiley Brand. |
SWIFT IN THE CLOUD |
Williamson, L., Ponzo, J., Bohrer, P., Olivieri, R., Weinmeister, K., & Kallner, S. (2017). Swift in the cloud. WILEY. |
CLOUD COMPUTING PRINCIPLES AND PARADIGMS |
Buyya, R., Broberg, J., & GosÌcinÌski, A. (Eds.) (2011). Cloud computing: Principles and paradigms. WILEY A JOHN WILEY & SONS, PUBLICATION. |
CLOUD COMPUTING: BUSINESS TRENDS AND TECHNOLOGIES |
Faynberg, I., Lu, H., & Skuler, D. (2016). Cloud computing: Business trends and technologies. WILEY. |
BIG-DATA ANALYTICS FOR CLOUD, IOT AND COGNITIVE COMPUTING |
Hwang, K., & Chen, M. (2017). Big-data analytics for cloud, IoT and cognitive computing. WILEY. |
CLOUD COMPUTING AND VIRTUALIZATION |
Le, D., Kumar, R., Nguyen, G. N., & Chatterjee, J. M. (2018). Cloud computing and virtualization. Scrivener Publishing; WILEY. |
DISTRIBUTED DATABASE MANAGEMENT SYSTEMS: A PRACTICAL APPROACH |
Rahimi, S. K., & Haug, F. S. (2010). Distributed database management systems: A practical approach. IEEE computer society; WILEY A JOHN WILEY & SONS, PUBLICATION. |
MANAGING THE TESTING PROCESS: PRACTICAL TOOLS AND TECHNIQUES FOR MANAGING HARDWARE AND SOFTWARE TESTING, THIRD EDITION |
Black, R. (2009). Managing the testing process: Practical tools and techniques for managing hardware and software testing (3rd ed.). Wiley Publishing. |