Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Linux for beginners: 37 linux commands y, Attila Kovacs, Kovacs


Варианты приобретения
Цена: 2757.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-23
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Attila Kovacs, Kovacs
Название:  Linux for beginners: 37 linux commands y
ISBN: 9781839381089
Издательство: Sabi shepherd ltd
Классификация:





ISBN-10: 1839381086
Обложка/Формат: Paperback
Страницы: 76
Вес: 0.13 кг.
Дата издания: 15.08.2019
Серия: 37 linux commands you must know
Язык: English
Размер: 150 x 230 x 2
Читательская аудитория: General (us: trade)
Подзаголовок: 37 linux commands you must know
Рейтинг:
Поставляется из: США
Описание: If you are looking to get started with the Linux command line interface you`ve definitely come to the right place!


Speaking for ielts: ielts 5-6+ (b1+)

Автор: Kovacs, Karen
Название: Speaking for ielts: ielts 5-6+ (b1+)
ISBN: 0008367515 ISBN-13(EAN): 9780008367510
Издательство: HarperCollins UK
Рейтинг:
Цена: 2374.00 р.
Наличие на складе: Поставка под заказ.

Описание: If your speaking is preventing you from getting the score you need in IELTS, Collins Speaking for IELTS can help. Don`t let one skill hold you back.

Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

Автор: Kovacs Attila
Название: Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
ISBN: 1839380101 ISBN-13(EAN): 9781839380105
Издательство: Неизвестно
Рейтинг:
Цена: 3723.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

- Do you want learn how to build a PenTest Lab but you don't know where to start?
- Do you want a practical book that explains step-by-step how to get going?
- Do you want to become an Ethical Hacker or PenTester?

If the answer is yes to the above questions, this book is for you

Frequently Asked Questions
-Question: I am new to IT, and I don't have any experience in the field of Hacking, should I get this book?
-Answer: This book is designed to those interested in Penetration Testing aka Ethical Hacking, and having limited, or no experience in the realm of Cybersecurity.

-Question: I am not a hacker. Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable. You will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:

  • What are the Foundations of Penetration Testing
  • What are the Benefits of Penetration Testing
  • What are the Frameworks of Penetration Testing
  • What Scanning Tools you should be Aware
  • What Credential Testing Tools you must Utilize
  • What Debugging & Software Assurance Tools are Available
  • Introduction to OSINT & Wireless Tools
  • What is a Web Proxy, SET & RDP
  • What Mobile Tools you should be familiar with
  • How Communication must take place
  • How to Cover your Back
  • How to Setup a Lab in NPE
  • How to Setup Hyper-V on Windows 10
  • How to Setup VMware on Windows 10
  • How to Assemble the Required Resources
  • How to Install Windows Server in VMware
  • How to Configure Windows Server in VMware
  • How to Install Windows Server in Hyper-V
  • How to Configure Windows Server in Hyper-V
  • How to Install & Configure OWASP-BWA in VMware
  • How to Install & Configure Metasploitable in VMware
  • How to Install Kali Linux in VMware
  • How to Install BlackArch in Hyper-V
  • What Categories of Penetration Tests exists
  • What Software & Hardware you must have as a PenTester
  • Understanding Confidentiality
  • What are the Rules of Engagement
  • How to set Objectives & Deliverables
  • What Type of Targets you must deal with
  • Specialized Systems for Pen Testers
  • How to Identify & Response to Risk
  • How to Prepare your Pen Test Team for an Engagement
  • What are the Best Practices before Going Live


BUY THIS BOOK NOW, AND GET STARTED TODAY

Cybersecurity for Beginners: What You Must Know about Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: What You Must Know about Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
ISBN: 183938008X ISBN-13(EAN): 9781839380082
Издательство: Неизвестно
Рейтинг:
Цена: 6344.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

3 BOOKS IN 1 DEAL INCLUDE:

  • BOOK 1 - WHAT YOU MUST KNOW ABOUT CYBERSECURITY
  • BOOK 2 - HOW TO GET A JOB IN CYBERSECURITY
  • BOOK 3 - HOW TO DEFEND AGAINST HACKERS & MALWARE


IN THIS BOOK YOU WILL LEARN:

  • What types of roles exist in the field of Cybersecurity
  • What Key Concepts & Methodologies you must learn in Cybersecurity
  • What are the Key technologies that you should be aware
  • How to get started in the field of Cybersecurity.
  • What kind of Cybersecurity Entry Level Salary you can expect
  • How to plan and achieve a realistic targets, using networking skills
  • Comprehend market hypes revolving around education and certifications
  • How to overcome obstructions and get things done
  • How to become a project oriented Security Professional
  • What kind of Mindset you must have in Cybersecurity
  • How to express your unique voice in Cybersecurity
  • What HR and hiring managers expect from you
  • How to optimize your LinkedIn profile and get recruiters to find you
  • How to enhance your LinkedIn profile to vastly rank yourself
  • How to get real life experience in Information Technology
  • How to get working experience by working for free
  • How to increase your chances to get a Security job
  • How you can get references, while making good money
  • How you can build your personal brand in Cybersecurity
  • How you can market yourself by providing value
  • How to network and make your presents visible
  • How to find the perfect employer in Cybersecurity
  • What responsibilities employers expect from you
  • How to become more valuable than the majority of candidates on the market
  • How you can find security certification that fits you best
  • What are the three most common entry level security roles
  • What daily tasks you must deliver in each position
  • What are the values of security certifications
  • How to become a successful Cybersecurity Professional
  • How you can apply yourself by your own unique view
  • What is Data Analytics in a Nutshell
  • How to Measure Cybersecurityin today's Tech Industry
  • How to use Trend Analysis to Prevent Intrusion
  • What is Data Aggregation and Correlation
  • What is Defense in Depth
  • What Breach Detection Tools you can Deploy
  • What is IPS aka Intrusion Prevention System
  • What are Software & Hardware Based Firewalls
  • What is and How to Deploy EMET aka Enhanced Mitigation Experience Toolkit
  • Why you must use Web Application Firewalls VS Proxys
  • What is Pen Testing and how to Identify Security Flows
  • What Pen Test Procedures you must follow
  • How Reverse Engineering Works
  • What Risk Evaluation Steps you must Follow
  • What are the Essentials of Security Frameworks
  • What are the Policy Framework Procedures
  • What are the Control Framework Procedures
  • What is and how to Deploy Quality Controls & Verification Processes, and much more...


BUY THIS BOOK NOW, AND GET STARTED TODAY

Ethical Hacking for Beginners: Pre-Engagement Process Execution

Автор: Kovacs Attila
Название: Ethical Hacking for Beginners: Pre-Engagement Process Execution
ISBN: 183938011X ISBN-13(EAN): 9781839380112
Издательство: Неизвестно
Рейтинг:
Цена: 2757.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Do you want learn about how to begin with a Penetration-Testing Objectives?
Do you want a practical book that explains step-by-step how to create a Pen-Test Checklist of Requirements?
Do you want to become an Ethical Hacker or Pen-Tester?

If the answer is yes to the above questions, this book is for you

Frequently Asked Questions
-Question: I am new to IT, and I don't have any experience in the field of Hacking, should I get this book?
-Answer: This book is designed to those interested in Penetration Testing aka Ethical Hacking, and having limited, or no experience in the realm of Cybersecurity.

-Question: I am not a hacker. Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable. You will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.

BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:
How to Establish Pen-Test Objectives
What Types of Penetration Tests Exists
What's is a Pre-engagement aka Stage 1
How to build a Checklist of Requirements
How to create a Client site Security Checklist
How to Compromise the Target aka Stage 2
What to include in your Post-attack aka Stage 3
What Pen-Test Standard Suits you best
What kinds of Target Footprinting Methods you should utilize
What steps are involved in the Reconnaissance Process
What kinds of Target Scanning Techniques you should utilize
How to Check for existing Vulnerabilities
SNMP & NMAP Enumeration Techniques
NTP & SMTP Enumeration Techniques, and much more...

BUY THIS BOOK NOW, AND GET STARTED TODAY

Cybersecurity for Beginners: How to Defend Against Hackers & Malware

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: How to Defend Against Hackers & Malware
ISBN: 1839380047 ISBN-13(EAN): 9781839380044
Издательство: Неизвестно
Рейтинг:
Цена: 3723.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?
Do you want to know what tools and techniques are used in Cybersecurity?
Do you want to know what daily tasks you must do to protect your Infrastructure?


If the answer is yes to the above questions, this book is for you

Frequently Asked Questions
-Question: I don't have any experience in the field of Cybersecurity, should I get this book?
-Answer: This book is designed to those interested in Cybersecurity, and having limited, or no experience in the realm of Cybersecurity, or general Information Technology.

-Question: Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:

  • What is Data Analytics in a Nutshell
  • How to Measure Cybersecurityin today's Tech Industry
  • How to use Trend Analysis to Prevent Intrusion
  • What is Data Aggregation and Correlation
  • What is Defense in Depth
  • What Breach Detection Tools you can Deploy
  • What is IPS aka Intrusion Prevention System
  • What are Software & Hardware Based Firewalls
  • What is and How to Deploy EMET aka Enhanced Mitigation Experience Toolkit
  • Why you must use Web Application Firewalls VS Proxys
  • What is Pen Testing and how to Identify Security Flows
  • What Pen Test Procedures you must follow
  • How Reverse Engineering Works
  • What Risk Evaluation Steps you must Follow
  • What are the Essentials of Security Frameworks
  • What are the Policy Framework Procedures
  • What are the Control Framework Procedures
  • What is and how to Deploy Quality Controls & Verification Processes, and much more...


BUY THIS BOOK NOW, AND GET STARTED TODAY

Cybersecurity for Beginners: How to Get a Job in Cybersecurity

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: How to Get a Job in Cybersecurity
ISBN: 1839380020 ISBN-13(EAN): 9781839380020
Издательство: Неизвестно
Рейтинг:
Цена: 3585.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

-Do you want to learn how to get real life experience in Information Technology?
-Do you want to know how you can get references, while making good money?
-Do you want to know how to increase your chances to get a Security job?


If the answer is yes to the above questions, this book is for you

-Frequently Asked Questions
-Question: I don't have any experience in the field of Cybersecurity, should I get this book?
-Answer: This book is designed to those interested in Cybersecurity, and having limited, or no experience in the realm of Cybersecurity, or general Information Technology.

-Question: Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I don't know what entry level Cybersecurity role I can get into. Will this book help me?
-Answer: Yes. In this book, you will learn about all types of Security Roles exists today, as well the day to day operations, which will help you decide what security path suits you best.

-Question: I don't have any certifications, and there are so many to choose from. Will this book help me understand the differences between certifications and degrees? Which one is better, and which ones do I need in order to get a job?
-Answer: Yes. This book will give you an overview of all Cybersecurity Certifications, and help you choose which one you should start with, according to your existing experience.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:

  • How to get real life experience in Information Technology
  • How to get working experience by working for free
  • How to increase your chances to get a Security job
  • How you can get references, while making good money
  • How you can build your personal brand in Cybersecurity
  • How you can market yourself by providing value
  • How to network and make your presents visible
  • How to find the perfect employer in Cybersecurity
  • What responsibilities employers expect from you
  • How to become more valuable than the majority of candidates on the market
  • How you can find security certification that fits you best
  • What are the three most common entry level security roles
  • What daily tasks you must deliver in each position
  • What are the values of security certifications
  • How to become a successful Cybersecurity Professional
  • How you can apply yourself by your own unique view


BUY THIS BOOK NOW, AND GET STARTED TODAY

Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity
ISBN: 1839380063 ISBN-13(EAN): 9781839380068
Издательство: Неизвестно
Рейтинг:
Цена: 4964.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Frequently Asked Questions
-Question: I don't know what entry level Cybersecurity role I can get into. Will this book help me?
-Answer: Yes. In this book, you will learn about all types of Security Roles exists today, as well the day to day operations, which will help you decide what security path suits you best.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN BOOK 1 YOU WILL LEARN:

  • What types of roles exist in the field of Cybersecurity
  • What Key Concepts & Methodologies you must learn in Cybersecurity
  • What are the Key technologies that you should be aware
  • How to get started in the field of Cybersecurity.
  • What kind of Cybersecurity Entry Level Salary you can expect
  • How to plan and achieve a realistic targets, using networking skills
  • Comprehend market hypes revolving around education and certifications
  • How to overcome obstructions and get things done
  • How to become a project oriented Security Professional
  • What kind of Mindset you must have in Cybersecurity
  • How to express your unique voice in Cybersecurity
  • What HR and hiring managers expect from you
  • How to optimize your LinkedIn profile and get recruiters to find you
  • How to enhance your LinkedIn profile to vastly rank yourself
  • BUY THIS BOOK NOW, AND GET STARTED TODAY
  • IN BOOK 2 YOU WILL LEARN:
  • How to get real life experience in Information Technology
  • How to get working experience by working for free
  • How to increase your chances to get a Security job
  • How you can get references, while making good money
  • How you can build your personal brand in Cybersecurity
  • How you can market yourself by providing value
  • How to network and make your presents visible
  • How to find the perfect employer in Cybersecurity
  • What responsibilities employers expect from you
  • How to become more valuable than the majority of candidates on the market
  • How you can find security certification that fits you best
  • What are the three most common entry level security roles
  • What daily tasks you must deliver in each position
  • What are the values of security certifications
  • How to become a successful Cybersecurity Professional
  • How you can apply yourself by your own unique view

BUY THIS BOOK NOW, AND GET STARTED TODAY

Practical test design

Автор: Forgacs, Istvan Kovacs, Attila
Название: Practical test design
ISBN: 1780174721 ISBN-13(EAN): 9781780174723
Издательство: Неизвестно
Рейтинг:
Цена: 8908.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents the key test design techniques, in line with ISTQB, and explains when and how to use them, including in combination, with practical, real-life examples. Automated test design methods are also explored. Tips and exercises are included throughout the book, allowing you to test your knowledge as you progress.

Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity
ISBN: 1839380071 ISBN-13(EAN): 9781839380075
Издательство: Неизвестно
Рейтинг:
Цена: 5516.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book contains 2 Manuscripts:

  • BOOK 1 - WHAT YOU MUST KNOW ABOUT CYBERSECURITY
  • BOOK 2 - HOW TO GET A JOB IN CYBERSECURITY


Frequently Asked Questions
-Question: I don't know what entry level Cybersecurity role I can get into. Will this book help me?
-Answer: Yes. In this book, you will learn about all types of Security Roles exists today, as well the day to day operations, which will help you decide what security path suits you best.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN BOOK 1 YOU WILL LEARN:

  • What types of roles exist in the field of Cybersecurity
  • What Key Concepts & Methodologies you must learn in Cybersecurity
  • What are the Key technologies that you should be aware
  • How to get started in the field of Cybersecurity.
  • What kind of Cybersecurity Entry Level Salary you can expect
  • How to plan and achieve a realistic targets, using networking skills
  • Comprehend market hypes revolving around education and certifications
  • How to overcome obstructions and get things done
  • How to become a project oriented Security Professional
  • What kind of Mindset you must have in Cybersecurity
  • How to express your unique voice in Cybersecurity
  • What HR and hiring managers expect from you
  • How to optimize your LinkedIn profile and get recruiters to find you
  • How to enhance your LinkedIn profile to vastly rank yourself
  • BUY THIS BOOK NOW, AND GET STARTED TODAY
  • IN BOOK 2 YOU WILL LEARN:
  • How to get real life experience in Information Technology
  • How to get working experience by working for free
  • How to increase your chances to get a Security job
  • How you can get references, while making good money
  • How you can build your personal brand in Cybersecurity
  • How you can market yourself by providing value
  • How to network and make your presents visible
  • How to find the perfect employer in Cybersecurity
  • What responsibilities employers expect from you
  • How to become more valuable than the majority of candidates on the market
  • How you can find security certification that fits you best
  • What are the three most common entry level security roles
  • What daily tasks you must deliver in each position
  • What are the values of security certifications
  • How to become a successful Cybersecurity Professional
  • How you can apply yourself by your own unique view


BUY THIS BOOK NOW, AND GET STARTED TODAY

Cybersecurity for Beginners: What You Must Know about Cybersecurity

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: What You Must Know about Cybersecurity
ISBN: 1839380004 ISBN-13(EAN): 9781839380006
Издательство: Неизвестно
Рейтинг:
Цена: 3585.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

-Do you want to learn what it takes to become a Cybersecurity Specialist?
-Do you want to know what types of Cybersecurity roles exist and how much money can you make?
-Do you want to create or enhance your LinkedIn profile, so recruiters would find you?


If the answer is yes to the above questions, this book is for you

-Frequently Asked Questions
-Question: I don't have any experience in the field of Cybersecurity, should I get this book?
-Answer: This book is designed to those interested in Cybersecurity, and having limited, or no experience in the realm of Cybersecurity, or general Information Technology.

-Question: Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I don't know what entry level Cybersecurity role I can get into. Will this book help me?
-Answer: Yes. In this book, you will learn about all types of Security Roles exists today, as well the day to day operations, which will help you decide what security path suits you best.

-Question: I don't have any certifications, and there are so many to choose from. Will this book help me understand the differences between certifications and degrees? Which one is better, and which ones do I need in order to get a job?
-Answer: Yes. This book will give you an overview of all Cybersecurity Certifications, and help you choose which one you should start with, according to your existing experience.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:

  • What types of roles exist in the field of Cybersecurity
  • What Key Concepts & Methodologies you must learn in Cybersecurity
  • What are the Key technologies that you should be aware
  • How to get started in the field of Cybersecurity.
  • What kind of Cybersecurity Entry Level Salary you can expect
  • How to plan and achieve a realistic targets, using networking skills
  • Comprehend market hypes revolving around education and certifications
  • How to overcome obstructions and get things done
  • How to become a project oriented Security Professional
  • What kind of Mindset you must have in Cybersecurity
  • How to express your unique voice in Cybersecurity
  • What HR and hiring managers expect from you
  • How to optimize your LinkedIn profile and get recruiters to find you
  • How to enhance your LinkedIn profile to vastly rank yourself


BUY THIS BOOK NOW, AND GET STARTED TODAY

Supply Chain Management for Humanitarians: Tools for Practice

Автор: Kovacs Gyongyi, Spens Karen, Haavisto Ira
Название: Supply Chain Management for Humanitarians: Tools for Practice
ISBN: 0749474688 ISBN-13(EAN): 9780749474683
Издательство: Неизвестно
Рейтинг:
Цена: 13288.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Examine supply chain management in the context of humanitarian logistics, supported by international practitioner case studies and problem-based learning.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия