|Exam Name||:||Storage Foundation and HA 6.0 Windows(R) Technical Assessment|
|Questions and Answers||:||171 Q & A|
|Updated On||:||March 22, 2019|
|PDF Download Mirror||:||Pass4sure ST0-149 Dump|
|Get Full Version||:||Pass4sure ST0-149 Full Version|
ST0-149 exam Dumps Source : Storage Foundation and HA 6.0 Windows(R) Technical Assessment
Test Code : ST0-149
Test Name : Storage Foundation and HA 6.0 Windows(R) Technical Assessment
Vendor Name : Symantec
Q&A : 171 Real Questions
I want actual examination questions today's ST0-149 examination.
There were many approaches for me to reach to my target vacation spot of high score inside the ST0-149 but i was no longerhaving the first-class in that. So, I did the quality aspect to me by means of taking place on-line ST0-149 study assist of the killexams.com mistakenly and determined that this mistake turned into a sweet one to be remembered for an extendedtime. I had scored well in my ST0-149 observe software program and thats all due to the killexams.com exercise test which became to be had on line.
what number of days preparation required to pass ST0-149 examination?
My planning for the exam ST0-149 was unsuitable and subjects seemed troublesome for me as well. As a snappy reference, I depended on the questions and answers by killexams.com and it delivered what I needed. Much oblige to the killexams.com for the assistance. To the point noting technique of this aide was not difficult to catch for me as well. I simply retained all that I could. A score of 92% was agreeable, contrasting with my 1-week battle.
New Syllabus ST0-149 Exam questions are provided here.
I am over the moon to mention that I passed the ST0-149 exam with 92% marks. killexams.com Questions & Answers notes made the entire component substantially easy and clear for me! Keep up the terrific work. In the wake of perusing your route notes and a bit of practice structure exam simulator, I changed into successfully geared up to skip the ST0-149 exam. Genuinely, your direction notes without a doubt supported up my actuality. Some subjects like Instructor Communication and Presentation Skills are achieved very nicely.
obtain those ST0-149 questions.
Word of mouth is a very strong way of marketing for a product. I say, when something is so good, why not do some positive publicity for it I would like to spread the word about this one of a kind and absolutely incredible killexams.com which helped me in performing outstandingly well in my ST0-149 exam and exceeding all expectations. I would say that this killexams.com is one of the most admirable online teaching ventures I have ever come across and it deserves a lot of recognition.
am i capable of locate phone number latest ST0-149 licensed?
I passed a week ago my ST0-149 confirmation test. killexams.com Q&A and exam Simulator are great item to buy, it clear my subject matters effects in a really time, i was stun to understand how wonderful theyre at their administrations. i would wish an excessive amount of obliged regarding the outstanding item which you really have that aided inside the arrangement and using the test. this is often out and away the most advantageous thorough and nicely little bit of composing. a lot obliged
How to prepare for ST0-149 exam in shortest time?
killexams.com is a great site for ST0-149 certification material. When I found you on the internet, I practically joyed in excitement because it was exactly what I was looking for. I was looking for some authentic and less costly help online because I didnt have the time to go through bunch of books. I found enough study question here that proved to be very beneficial. I was able to score well in my Symantec test and Im obliged.
actual test questions of ST0-149 exam! terrific source.
killexams.com provides dependable IT exam stuff, i have been the use of them for years. This exam is no exception: I passed ST0-149 the usage of killexams.com questions/answers and exam simulator. Everything human beings say is authentic: the questions are genuine, this is a totally reliable braindump, completely legitimate. And I actually have only heard rightly things approximately their customer support, however in my view I by no means had issues that might lead me to contact them in the first region. Just top class.
Is there ST0-149 examination new sayllabus?
This exam preparation kit has proven itself to be absolutely worth the money as I passed the ST0-149 exam earlier this week with the score of 94%. All questions are valid, this is what they give you at the exam! I dont know how killexams.com does it, but they have been keeping this up for years. My cousin used them for another IT exam years ago and says they were just as good back in the day. Very reliable and trustworthy.
Nice to hear that real test questions of ST0-149 exam are provided here.
We need to discover ways to choose our brain simply the identical manner, we pick out out our garments everyday. This is the energy we are able to habitat.Having stated that If we need to do matters in our life, we should war difficult to recognize all its powers. I did so and worked tough on killexams.com to find out high-quality position in ST0-149 exam with the assist of killexams.com that proved very energetic and extraordinary application to discover desired feature in ST0-149 exam.It changed into a super application to make my existence relaxed.
ST0-149 real take a look at questions and answers!
that is the fine ST0-149 aid on internet. killexams.com is one I trust. What they gave to me is extra precious than cash, they gave me schooling. i used to be reading for my ST0-149 test once I made an account on here and what I got in go back laboredbasically like magic for me and i used to be very amazed at how top notch it felt. My ST0-149 test regarded like a singlepassed element to me and that i finished achievement.
Symantec Corp. upgraded its Storage groundwork storage management and file gadget software nowadays, taking advantage of flash to enhance performance of DAS.
Symantec Storage basis 6.1 includes two new flash-related features. flexible Storage Sharing (FSS) works inside the Storage basis Cluster File system (CFS), using server-primarily based flash to allow sharing of storage throughout nodes with out a SAN or network-connected storage. SmartIO uses flash to cache records on the application level, serving as a read cache from the host. It caches hot facts on native solid-state drives (SSDs) to enrich performance and reduce latency.
Symantec also added guide for red Hat enterprise Virtualization in Storage basis to go together with previous guide of VMware and Microsoft virtualization systems.
CFS is used for high availability and quickly failover for disaster recuperation, however except edition 6.1 it might best be used with shared storage. FSS takes expertise of faraway direct reminiscence entry help over InfiniBand, Converged Ethernet and 10 Gigabit Ethernet to movement functions between DAS clusters. Admins can install clustered volumes to run on distinct nodes. statistics on inner disks can also be exported or shared with other nodes in the cluster. If the host goes down, statistics can be accessed on yet another node in the cluster.
"DAS is coming again because SSDs make it feasible," noted Arun Balakrishnan, Symantec's supervisor of guidance availability. "We're enabling a shared-nothing infrastructure. Servers can now access far off storage as if it were native storage."
Balakrishnan observed the aim is to eliminate the bottleneck between the server and storage array that mitigates the performance of flash in shared storage. "You nonetheless need to connect arrays to servers [when using shared storage], and that interconnect is the bottleneck," he observed. "Latencies are nonetheless in the millisecond latitude."
SmartIO controls caching at quantity, file gadget and file degrees, optimizing input/output for the application and lower back-end storage. It permits software, database and server administrators to flow their reads and writes inside the server.
Flash-caching utility products are already typical, with most PCI express flash vendors offering them with their playing cards. Storage carriers EMC Corp. (XtremSF) and NetApp Inc. (Flash Accel) additionally sell flash-caching application.
Balakrishnan talked about Symantec's caching works throughout any flash hardware. "We're now not tied to a particular supplier, and we are able to work along with your latest storage," he mentioned.
Ashish Nadkarni, research director for storage at Framingham, Mass.-primarily based IDC, pointed out that by way of embracing DAS, Symantec is moving to present a standalone stack that can compete with other file techniques.
"Symantec is aggressively relocating Storage basis from being an enablement platform to being a standalone stack," he pointed out. "As a standalone stack, you can practically construct a storage answer such as you would build it the usage of pink Hat Gluster or EMC Isilon. you could buy Symantec Storage groundwork as a storage platform supplying storage capabilities. Symantec has come to the conclusion that it can not be the business that allows other americans's storage."
Nadkarni referred to the approach is corresponding to what Symantec has carried out in backup, putting its NetBackup and Backup Exec software functions on built-in home equipment. "or not it's fitting increasingly complicated to prevail as a software-best company," he noted.
Dell applied sciences DELL pronounced fourth-quarter fiscal 2019 non-GAAP net salary of $1.6 billion, up 26% year over yr.
Revenues multiplied 8% year over year to $24.01 billion and surpassed the Zacks Consensus Estimate of $23.forty six billion. The enhance in revenues changed into driven by double-digit growth in servers, VMware and expanding commercial client consumer base.
exceptionally, this become the primary quarterly profits results Dell reported after it returned to the public market on Dec 28, 2018.
Quarter in particulars
Infrastructure solutions community (ISG) (forty one.2% of total internet revenues) revenues for the said quarter accelerated 10% year over 12 months to $9.9 billion. This turned into driven by using a 14% boost in servers and networking revenues and seven% enhance in storage revenues 12 months over 12 months.
client options group (CSG) (forty five.4% of total internet revenues) revenues changed into $10.9 billion, up 4% 12 months over yr. while business revenues grew 9% year over 12 months to $7.eight billion, consumer revenues were down 6% 12 months over 12 months to $three.1 billion.
moreover, the enterprise witnessed yr-over-year international computing device share increase in the suggested quarter.
VMware VMW revenues had been $2.6 billion (10.8%) in the quarter, up 17% yr over yr. chiefly, Dell has a majority stake in VMware. The company additionally own stakes in Pivotal application PVTL and SecureWorks.
VMware and Pivotal announced availability of the new VMware PKS solution Competency in the stated quarter. moreover, Dell EMC PowerMax and Dell EMC cohesion certified as exterior storage arrays with VMware Cloud basis.
VMware witnessed electricity throughout its product portfolio in all three major geographies, which is a favorable.
Revenues from different organizations, together with Pivotal, Secureworks, RSA protection, Virtustream and Boomi, accelerated 5% 12 months over 12 months to $593 million.
The business also received shoppers. VxRail combined Dell EMC compute and storage with VMware application in an trade leading HCI answer in the said quarter.
Dell applied sciences Inc. expense, Consensus and EPS shock
Dell applied sciences Inc. rate, Consensus and EPS shock | Dell applied sciences Inc. Quote
Non-GAAP gross margin accelerated one hundred groundwork aspects (bps) from the 12 months-in the past quarter to 33% pushed with the aid of greater gross margins in ISG and CSG products.
Adjusted EBITDA extended eleven% year over year to $three.03 billion and EBITDA margin multiplied one hundred bps yr over 12 months.
Non-GAAP operating charges multiplied 13% year over 12 months to $5.38 billion. in addition, working expenses, as a percent of revenues, accelerated 100 bps year over year to $5.38 billion. Dell continues to invest in sales means, which fueled the boost in working costs within the said quarter.
ISG and VMware working profits accelerated 21% and four% yr over 12 months to $1.27 billion and $872 million, respectively. despite the fact, CSG working income declined 1% 12 months over 12 months to $555 million.
Non-GAAP working salary was $2.66 billion, up 12% from the 12 months-ago quarter. operating margin remained flat yr over 12 months.
Non-GAAP revenues for fiscal 2020 are expected within the range of $ninety three billion and $ninety six billion. Non-GAAP working profits is anticipated between $9 billion to $9.6 billion
The business expects first-quarter fiscal 2020 operating fees to decline sequentially.
For fiscal 2020, Dell applied sciences expects to repay approximately $4.eight billion of debt during the mixture of steadiness sheet money and free money stream.
Zacks Rank & shares to believe
at present, Dell has a Zacks Rank #3 (hang).
a stronger-ranked stock within the broader computer and expertise sector is Symantec supplier SYMC, wearing a Zacks Rank #1 (potent purchase). that you could see the finished list of today’s Zacks Rank #1 stocks here.
Zacks' true 10 shares for 2019
besides the shares mentioned above, would not you like to find out about our 10 most suitable purchase-and-holds for the yr?
From more than 4,000 groups covered by way of the Zacks Rank, these 10 were picked by using a technique that constantly beats the market. Even all over 2018 while the market dropped -5.2%, our properly 10s had been up neatly into double-digits. And throughout bullish 2012 – 2017, they soared a ways above the market's +126.3%, reaching +181.9%.
This 12 months, the portfolio aspects a participant that prospers on volatility, an AI comer, and a dynamic tech business that helps doctors bring more advantageous affected person outcomes at reduce expenses.
See shares nowadays >>
desire the newest suggestions from Zacks funding analysis? nowadays, that you would be able to download 7 most appropriate stocks for the next 30 Days. click to get this free document Dell applied sciences Inc. (DELL) : Free inventory analysis document Symantec corporation (SYMC) : Free stock evaluation record VMware, Inc. (VMW) : Free stock evaluation file Pivotal application, Inc. (PVTL) : Free inventory evaluation file To read this article on Zacks.com click on right here. Zacks investment analysis
While it is hard errand to pick solid certification questions/answers assets regarding review, reputation and validity since individuals get sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets as for exam dumps update and validity. The greater part of other's sham report objection customers come to us for the brain dumps and pass their exams cheerfully and effortlessly. We never bargain on our review, reputation and quality because killexams review, killexams reputation and killexams customer certainty is imperative to us. Extraordinarily we deal with killexams.com review, killexams.com reputation, killexams.com sham report grievance, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. On the off chance that you see any false report posted by our rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com protestation or something like this, simply remember there are constantly terrible individuals harming reputation of good administrations because of their advantages. There are a great many fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams rehearse questions, killexams exam simulator. Visit Killexams.com, our example questions and test brain dumps, our exam simulator and you will realize that killexams.com is the best brain dumps site.
NS0-111 questions and answers | GB0-190 dump | ST0-248 study guide | CEN dumps questions | 2M00001A braindumps | 71-178 questions and answers | HP0-S16 dumps | LOT-951 real questions | 000-M248 braindumps | 1D0-621 practice questions | NS0-131 study guide | 1Z1-050 braindumps | 920-141 sample test | 70-348 real questions | CBAP cheat sheets | 00M-220 Practice test | 000-M70 test prep | HP5-K02D free pdf | USMLE practice exam | JN0-1100 exam prep |
Individuals utilized these Symantec dumps to get 100% marks
killexams.com Symantec Certification examine guides are setup by IT specialists. Groups of understudies have been crying that there are an exorbitant number of questions in such a critical number of preparing exams and study help, and they are as of late can not stand to deal with the expense of any more. Seeing killexams.com pros work out this extensive interpretation while still affirmation that all the learning is anchored after significant research and exam.
Just get our ST0-149 questions bank and feel assured regarding the ST0-149 exam. You will pass ST0-149 your test at high marks or refund. we have got aggregative an information of ST0-149 Dumps from real tests thus on offer you an opportunity to induce prepared and pass ST0-149 exam on the first attempt. Merely found out our test engine and acquire prepared. You will pass the test. killexams.com Discount Coupons and Promo Codes are as under; WC2017 : 60% Discount Coupon for all exams on website PROF17 : 10% Discount Coupon for Orders larger than $69 DEAL17 : 15% Discount Coupon for Orders larger than $99 SEPSPECIAL : 10% Special Discount Coupon for All Orders Detail is at http://killexams.com/pass4sure/exam-detail/ST0-149
killexams.com helps a great many applicants pass the exams and get their certifications. We have a huge number of effective surveys. Our dumps are solid, reasonable, updated and of truly best quality to conquer the troubles of any IT certifications. killexams.com exam dumps are most recent updated in exceedingly outflank way on customary premise and material is discharged intermittently. Most recent killexams.com dumps are accessible in testing focuses with whom we are keeping up our relationship to get most recent material.
The killexams.com exam questions for ST0-149 Storage Foundation and HA 6.0 Windows(R) Technical Assessment exam is basically in view of two available arrangements, PDF and Practice software. PDF record conveys all the exam questions, answers which makes your planning less hardworking. While the Practice software are the complimentary element in the exam item. Which serves to self-survey your advance. The assessment apparatus additionally features your feeble regions, where you have to put more attempt with the goal that you can enhance every one of your worries.
killexams.com suggest you to must attempt its free demo, you will see the natural UI and furthermore you will think that its simple to alter the prep mode. In any case, ensure that, the real ST0-149 exam has a larger number of questions than the sample exam. On the off chance that, you are placated with its demo then you can buy the real ST0-149 exam item. killexams.com offers you three months free updates of ST0-149 Storage Foundation and HA 6.0 Windows(R) Technical Assessment exam questions. Our certification team is constantly accessible at back end who updates the material as and when required.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for all exams on website
PROF17 : 10% Discount Coupon for Orders greater than $69
DEAL17 : 15% Discount Coupon for Orders greater than $99
DECSPECIAL : 10% Special Discount Coupon for All Orders
Killexams S90-19A real questions | Killexams 350-027 dumps | Killexams 1Z0-457 free pdf | Killexams EX0-101 practice exam | Killexams CMA exam prep | Killexams 000-892 questions answers | Killexams 70-680 dumps questions | Killexams 000-034 dump | Killexams CAT-060 questions and answers | Killexams A2040-924 braindumps | Killexams COG-635 cheat sheets | Killexams 000-426 Practice test | Killexams 9A0-068 examcollection | Killexams 000-M99 mock exam | Killexams NS0-159 VCE | Killexams PMI-200 questions and answers | Killexams 050-649 test prep | Killexams 117-302 braindumps | Killexams 1V0-602 test prep | Killexams 190-951 practice questions |
Killexams C2040-420 test prep | Killexams 1Z0-859 dumps | Killexams C2090-012 practice questions | Killexams 9A0-384 examcollection | Killexams HP0-J66 pdf download | Killexams HP2-E47 exam questions | Killexams SU0-211 practice questions | Killexams NS0-140 cram | Killexams 000-N45 study guide | Killexams 300-170 brain dumps | Killexams C2150-575 exam prep | Killexams 1Z0-329 practice exam | Killexams HP2-H67 real questions | Killexams 920-323 practice test | Killexams M70-301 test prep | Killexams HP0-J33 braindumps | Killexams 000-806 Practice Test | Killexams C2170-010 real questions | Killexams 000-N31 free pdf | Killexams HP2-E62 study guide |
Annala J H (1996) New Zealand’s ITQ system: have the first eight years been a success or a failure? Rev in Fish biol. and Fisheries vol. 6 (1) - 1996 pp 43-62
Anon (1997) - Statement of conclusions, 5th International Conference on the Protection of the North Sea - Intermediate Ministerial Meeting on the Integration of Fisheries and Environmental Issues - Bergen, Norway 13/14 March 1997
Bailey K, Williams P G and Itano D - (1996) By-catch and discards in Western Pacific tuna fisheries: A review of SPC data holdings and literature. SPC Oceanic Fisheries Programme Technical Report No 34. Noumea, New Caledonia 1996.
Barratt F A (1986). A study on the feasibility of utilizing prawn by-catch for human consumption. Report to South Pacific Regional Fisheries Development Programme - RAS/85/004. FAO Oct. 1986
Bejei A (1980) Observations on the trash fish from catches of a prawn trawler in coastal waters of Sarawak. Paper presented at Workshop on the biology and resources of penaeid shrimp in the South China Sea area. 30 June - 5 July 1980 Kota Kinabalu, Malaysia. SCS/GEN/80/26
Bligh E G and R Duclos (1982) - Salting of minced fish. From: Fish By-catch...Bonus from the Sea: report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982.
Bostock T (1987) Marine fisheries of Gujarat: post harvest losses: possibilities for development. Report of the Tropical Development and Research Institute, No L25. UK 1987
Bostock T and Ryder J (1995) By-catch usage in India: an NRI/ODA BOBP project experience. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
Brander K M (1981) Disappearance of common skate Raja batis from the Irish Sea. Nature Vol. 290 (5801) p 48 - 49
Branstetter S (1997) Bycatch and it’s reduction in the Gulf of Mexico and the South Atlantic shrimp fisheries. Gulf and South Atlantic Fisheries Development Foundation, Inc., Tampa, Florida
CEC (1996) Proposal for a Council Regulation (EC) laying down certain technical measures for the conservation of fishery resources. (96/C 292/01) COM (96) 295 final - 96/0160 (CNS)
CEC (1992) - Report from the Commission to the Council on the discarding of fish in Community fisheries: causes, impact, solutions. CEC 12 March 1992 SEC (91) 413 final
Chan E H and Liew H C (1986) Characteristics of an exploited tropical shallow-water demersal fish community in Malaysia. In Proceedings of the First Asian Fisheries Forum. Asian Fisheries Society, (Maclean J L, Dizon L B and Hosillos LV, eds) 26 - 31 May 1986 Manila. pp 349 - 352
Chee P E (1996) A review of the bycatch and discards in the fisheries of Southeast Asia - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
Clucas I J (1996) Reduction of fish wastage - An introduction. In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO 1996.
Crean K and Symes D (1994). The discards problem: towards a European solution. Marine Policy 18 (5) 422-434 pp 1994
Disney J G, Parr W H and Morgan D L (1978) Fish silage: preparation, utilisation and prospects for development. In: Proceedings of symposium on fish utilisation technology and marketing in the IPFC Region, Section III. IPFC 18th Session Manila, The Philippines, March 1978.
Duthie A (1996) Estimates of discards in the 1994 Atlantic Canada fisheries (Part of FAO region 21). - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO 1996.
Evans S M, J E Hunter, Elizal and Wahhju R I (1994) Composition and fate of catch and bycatch in the Farne Deep (North Sea) Nephrops fishery ICES Journal of Marine Science Vol. 51 (2) pp 155 - 168
Eyabi-Eyabi G (1995) Utilisation of by-catch from shrimp trawlers in Cameroon. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
FAO (1995) Code of Conduct for Responsible Fisheries - Rome, FAO 1995
FAO (1996a) Report on the Technical Consultation on Reduction of Wastage in Fisheries. Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547. Rome, FAO 1996.
FAO (1996b) FAO Yearbook - Fishery Statistics: catches and landings - 1994 Vol. 78. Rome, FAO 1996
FAO (1996c) FAO Yearbook - Fishery Statistics: commodities - 1994 Vol. 79. Rome, FAO 1996
FAO (1996d) AQUACULT-PC. Rome, FAO 1996
FAO (1997) The State of World Fisheries and Aquaculture 1996. Rome, FAO 1997
Feidi I (1989) Economic utilization of fish by-catch and by-products in the Arab Gulf region. Paper prepared for Seminar on Economic Utilization of Waste. INFOSAMAK/FAO. Jeddah 1989
Garcia-Rodriquez E (1995) Utilisation of shrimp by-catch in Cuba. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
Gordon A (1991) The by-catch from Indian shrimp trawlers in the Bay of Bengal: the potential for its improved utilisation. FAO/BOBP Working Paper No 68, 1991. Madras, India
Gordon R M (1981) Guyana. In Fish By-catch....Bonus from the Sea : report on a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana 27-30 October 1981. p131 Ottawa IDRC 1982
Grafton R Q (1996) - ITQs: theory and practice. Rev in Fish biol. and Fisheries vol. 6 (1) - 1996 pp 5-20
Gulland J A and Rothschild B J (eds.) (1982) Penaeid shrimps - their biology and management. Fishing News Books. Farnham , England.
Hall M A (1996) On bycatches. Reviews in Fish Biology and Fisheries vol. 6 (3) pp 319 - 352 (1996)
Harris A N and Poiner I R (1990) By-catch of the prawn fishery of the Torres Strait, composition and partitioning of discards into components that float or sink. Austr. J. Mar. Freshwater Res. Vol. 41 pp 37 - 52
Hendrickson H M and Griffin W L (1993) An analysis of management policies for reducing shrimp by-catch in the Gulf of Mexico. North American journal of fisheries management. Lawrence KS; vol. 13, no. 4, pp. 686-697; 1993
IDRC (1982) Fish By-catch...Bonus from the Sea : report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982.
Isaksen B (1996) The Norwegian approach to reduce bycatch and avoid discards. - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
Isaksen B and Larsen R B (1993) Size selectivity for shallow water shrimps using a rigid metal grid in the aft and top section of the trawl. Report of Institute of Marine Research, Bergen and The Norwegian College of Fishery Science, Tromsø, Norway
Jallow A M (1995) Recent positive and negative experiences on the utilisation of shrimp by-catch in the Gambia. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
Japanese Fishery Agency (1995) The Kyoto Declaration and Plan of Action - Fisheries Agency, The Government of Japan 1995
Japp D (1996) Discarding practices and bycatches for fisheries in the Southeast Atlantic region (Area 47) - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
Jensen H, Emslie D and Coull K (1996) Discards of fish species of no or little economic interest. Study Contract no 92/3508 - final report for Commission of the European Comunity, May 1994
Kelleher V and A Mussa (1995) Retention of by-catch for human consumption; The Mozambique experience. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
Kulberg R (1989) Shrimp trawler by-catch in Andhra Pradesh, India. Report on a minor field study to BOBP. Oct. - Dec. 1988. SIDA funded.
Kungsawan A (1996) Regulations, practices and statistics with regard to by-catch in the shrimp industries in Thailand. Paper prepared for FAO - mimeo 1996
Lieveld R (1995) Utilisation of shrimp bycatch in Suriname. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
Løbach T and Viem A K (1996) Compatibility and applicability of discard/retention rules for the conservation and utilisation of fishery resources in the Northwest Atlantic. Workshop on Discard/Retention Rules. St Petersburg. 7-8 September 1996
Matsuoka T (1996) Discards in Japanese marine capture fisheries and their estimation - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
Mgawe Y (1995) Recent positive and negative experiences in Tanzania with regard to utilisation of Shrimp by-catch. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
NOAA (1997) - Federal fishing regulations pertaining to the exclusive economic zone off Alaska. AL Regulations - National Marine Fisheries Service, Juneau, Alaska 1997
Nolan C P and Yau C (1996) Observed and reported estimates of discard and bycatch from the commercial fishery of the Falkland Islands - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
OECD (1997a) Towards sustainable fisheries: economic aspects of the managment of living marine resources. OECD Paris 1997
OECD (1997b) Towards sustainable fisheries: Country reports (European Union) OECD - OCDE/GD(97)119 Paris 1997
Pauly D and Neal R (1985) Shrimp vs. fish in Southeast Asian fisheries: the biological, technological and social problems. In: Recuros Pesqueros Potenciales de Mexico: La Pesca Acompañante del Camarón. Progr Univ de Alimentos, Inst Cienc del Mar y Limnol., Inst. Nac. de Pesca, UNAM, Mexic D F pp 487 - 510
Pender P J, Willing R S and Canns B (1992b). NPF by-catch a valuable resource ? Is it worth the effort. Australian Fisheries February 1992 pp 30 -31
Pender P J, Willing R S and Ramm D C (1992a). Northern Prawn Fishery bycatch study: Distribution, abundance, size and use of bycatch from the mixed species fishery. Fishery Report No 26 Department of Primary Industry and Fisheries, Northern Territory, Darwin Australia. 1992
Petersen E E (1981) The Guyana project: industrial use of by-catch. In Fish By-catch....Bonus from the Sea : report on a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana 27-30 October 1981. p69 Ottawa IDRC 1982
Poulter N H (1982) - Canned, frozen and dried products from by-catch fish. From: Fish By-catch...Bonus from the Sea : report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982.
Productos Pesqueros Mexicanos (1982) - Pepepez - A new, frozen minced product. From: Fish By-catch...Bonus from the Sea : report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982.
Queirolo L E, Fritz L W, Lingston P A, Loefflad M R, Colpo D A and deReynier Y L (1995) Bycatch, utilisation and discards in the commercial groundfish fisheries of the Gulf of Alaska, Eastern Bering Sea and Aleutian Islands. NOAA Technical Memorandum NMFS-AFSC-58. US Dept of Comm., NOAA - November 1995
Rakotondrasoa M (1995) Récupéperation du poisson d’accompagnement de la pêche crevettière - l’expérience Malgache. In Report and Proceedings of TCDC Workshop - Utilisation of by-catch from Shrimp Trawlers, 6 - 8 June 1995. Nose Bé, Madagascar. Govt of Madagascar/UNDO/FAO 1995
Redant F and Polet H (1994) Introduction on the finfish by-catches and discards in the Belgian Norway lobster (Nephrops norvegicus) fishery. International Council for the Exploration of the Sea, Demersal Fish committee CM1994/G:29
Saisithi B (1982) Thailand. In: Fish By-catch....Bonus from the Sea : report on a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana 27-30 October 1981. Ottawa IDRC 1982.
Salz P (Ed) (1996) Bio-economic evaluation of multi-species and multi-annual fisheries management measures The Hague, Agricultural Economics Research Institute (LEI-DLO), 1996.
Saville A (1980) The assessment and management of pelagic fish stocks: discussion and conclusion of symposium. In: Rapports et Proces Verbaux des Reunion du Conseil International pour L’Exploration de la Mer. ICES 177 pp 513-517
Smith A (1996) Estimation of discards in the North East Atlantic (Area 27) - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
Smith T P (1993) Allocating the incidental catch of crab, halibut, herring and salmon in the groundfish fisheries off Alaska In Proceedings of "The International Symposium on Management Strategies for Exploited Fish Populations" Anchorage Alaska 21 - 24 Oct. 1992
Suwanrangsi S (1988) By-catch utilisation in Thailand. INFOFISH International 5/88, 1988.
Tableros M A and R H Young (1982) - Acceptability and storage characteristics of frozen, minced products from Mexican by-catch. From: Fish By-catch...Bonus from the Sea : report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982.
Tan Sen Min, Tatsuru Fujiwara, Ng Mui Chng and Tan Ching Ean (1982) - Processing of by-catch into frozen minced blocks (surimi) and jelly products. From: Fish By-catch...Bonus from the Sea : report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982
Thorsteinsson G (1992) Experiments with square mesh windows in the Nephrops trawling off South Iceland. Conc. meeting of the ICES 24 Sept. to 2 Oct. 1992. pubs ICES 1993
Thorsteinsson H P and G Valdimarsson (1994) Experimental utilisation and marketing of by-catches and deep water species in Iceland. From: Deep-Water Fisheries of the North Atlantic Oceanic Slope: Proceedings of the NATO Advanced Research Workshop, Hull, UK, March 1994. A G Hopper (Ed) Kluwer Academic Pubs.
Truelove K (1997) Australia: Policy options for fisheries bycatch. In: Towards sustainable fisheries: Issue papers. OCDE/GD(97)54 OECD Paris 1997
U Khum Mg Aye (1995) Bycatch in commercial trawling for shrimp in Myanmar. Mimeo paper presented at Workshop on Research in Fishing Gear and Methods Selectivity in the Southeast Asian Countries with special attention to shrimp fishing. Chendering, Malaysia - May 1995
USA (1996) Magnuson-Stevens fishery conservation and management act. Public Law 94-265 US Department of Commerce/NOAA/NMFS. NOAA Technical Memorandum NMFS-F/SPO-23. December 1996
Vold Soladal A and Engås A (1997). Survival of young gadoids excluded from a shrimp trawl by a rigid deflecting grid. ICES Journal of Marine Science. Vol. 54 (1), Feb. 1997
Young R H (1982) - Development of a salted, minced product from Mexican shrimp From: Fish By-catch...Bonus from the Sea : report of a technical consultation on shrimp by-catch utilisation held in Georgetown, Guyana, 28-30 October 1981. Ottawa, Ont., IDRC, 1982
Zhou Y and Yimin Y (1996) Estimation of discards and bycatch in Chinese fisheries - In Report on the Technical Consultation on Reduction of Wastage in Fisheries. (Clucas I J and D James - Eds.) Tokyo, Japan, 28 October - 1 November 1996. FAO Fisheries Report. No 547 supplement. Rome, FAO, 1996.
In this first part of a two-part series on information security books, Ed Tittel compiles a collection of pointers to useful and informative books on information security. Though this list was originally compiled to prep for the CISSP exam, interested IT professionals from all areas in this field should find it helpful.
by Ed Tittel
Although the first draft of this article appeared in 2003, recent IT employment surveys, certification studies, and polls of IT professionals and system and network security continue to represent core technical competencies worthy of cultivation. To help you explore this fascinating field and appreciate its breadth and depth, Ed Tittel has put together a pair of articles that together cover information security (or InfoSec, as it's sometimes called) books as completely as possible. All the books in here are worth owning, although you may not need to acquire all books on identical or related topics from these lists. Together this compilation documents the best-loved and respected titles in the field. This is the first of two parts, so be sure to check out its successor story as well.
In this article, I present the first installment of a two-part story on computer security books, in which I recommend titles that are bound to be noteworthy for those with an interest in this field. In my particular case, I'm updating materials relevant to the Certified Information Systems Security Professional (CISSP) exam and digging my way through the most useful elements of a very large body of work on this subject matter. And of course, I also like to make sure that current "hot" titles show up in this list as well.
This list and its companion emerged from the following research:
Expert and ordinary reader reviews[md]and just under half the items mentioned here, my own personal experience[md]show me that there are amazing numbers of truly outstanding books in this field. If you find yourself reading something you don't like or can't understand in this arena, don't be afraid to investigate alternatives. There are plenty of them!
To avoid the potential unpleasantness involved in ranking these titles, I present them in alphabetical order indexed by the primary author's last name.
Adams, Carlisle and Steve Lloyd: Understanding PKI: Concepts, Standards, and Deployment Considerations, 2e, Addison-Wesley, 2010, ISBN-13: 978-0321743091.
This book covers the basic principles needed to understand, design, deploy, and manage safe and secure PKI installations and information related to the issuance, use, and management of digital certificates. It provides special emphasis on certificates and certification, operational considerations related to deployment and use of PKI, and relevant standards and interoperability issues. It's a great overall introduction to the topic of PKI that's not too deeply technical.
Allen, Julia H.: The CERT Guide to System and Network Security Practices, Addison-Wesley, 2001, ISBN-13: 978-0201737233.
Here, the author distills numerous best practices and recommendations from the Computer Emergency Response Team (CERT) and its vast body of experience with computer security incidents, exploits, and attacks. Advice is couched generically rather than in terms of particular platforms or applications, so some translation will be necessary to implement that advice. Topics covered include hardening systems and networks, detecting and handling break-ins or other types of attack, and designing effective security policies.
Bishop, Matt: Computer Security: Art and Science, Addison-Wesley, 2003, ISBN-13: 978-0201440997.
Professor Matt Bishop packs his security expertise into this well-written, comprehensive computer security tome. This book has been successfully tested at advanced undergraduate and introductory graduate levels, and can be a useful addition to security certification courses. Topics covered include the theoretical and practical aspects of security policies; models, cryptography, and key management; authentication, biometrics, access control, information flow and analysis, and assurance and trust.
Bosworth, Seymour, M.E. Kabay, and Eric Whyne: Computer Security Handbook, 5e, Wiley, February 2009, ISBN-13: 978-0471716525.
An expensive but extremely popular graduate level and certification preparation textbook, this is one of the best general all-around references on information security topics available anywhere. It also includes a CD with tools for checklists, audits, and compliance checks.
Bott, Ed, Carl Siechert, and Craig Stinson: Windows 7 Inside Out, MS Press, September 2009, ISBN-13: 978-0735626652.
Though this book is a general, across-the-board Windows 7 tips-and-tricks tome, its coverage and intense focus on security topics makes it all the more valuable. It's an excellent book for those seeking to make the most of Windows 7 computing, including on the information security front.
Bradley, Tony: Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security, Syngress, 2007, ISBN-13: 978-1597491143.
Tony Bradley is About.com's expert on information security (which they call Internet Network Security), and has been writing broadly in this field for more than a decade. This book aims at SOHO and SMB users, and provides excellent coverage for most essential security topics without digging overly deeply into technical details and underpinnings. A great book to start into the InfoSec field; or to recommend to friends, co-workers, or family members who just want to understand and apply fundamental principles for safe computing.
Bragg, Roberta: Hardening Windows Systems, McGraw-Hill/Osborne Media, May 2004, ISBN-13: 978-0072253542.
Bragg is simply one of the very best writers and teachers on Windows security topics, and this book does an excellent job of explaining and exploring system lockdown and hardening techniques for Windows. Although it predates Windows 7 and even Vista, much of this book's advice is still pertinent.
Cache, Johnny, Joshua Wright, and Vincent Liu: Hacking Exposed Wireless, 2e, McGraw-Hill, July 2010, ISBN-13: 978-0071666619.
This latest edition focuses on wireless network security vulnerabilities and the tools and techniques that attackers use to hack into Wi-Fi, Bluetooth, ZigBee, and DECT connections. The authors cover many attacker tools in depth, including Aircrack-ng, coWPAtty, FreeRADIUS-WPE, IPPON, KillerBee, and Pyrit. In addition to learning how attackers can infiltrate your computers and networks, you'll pick up tips to lock down connections and mop up after a successful attack (if you're caught with your defenses down).
Calder, Alan and Steve Watkins: IT Governance: A Manager's Guide to Data Security and ISO 27001/ISO 27002, Kogan Page, June 2008, ISBN-13: 978-0749452711.
This book examines best-practices standards and procedures for data security and protection in light of Sarbanes-Oxley (U.S.) and the Turnbull Report and the Combined Code (UK) requirements. It is chock full of information and advice to help managers and IT professionals ensure that IT security strategies are coordinated, compliant, comprehensive, and cost-appropriate.
Caloyannides, Michael A.: Privacy Protection and Computer Forensics, 2e, Artech House, October 2004, ISBN-13: 978-1580538305.
This technical yet readable title addresses privacy rights for individuals who seek to protect personal or confidential information from unauthorized access. It includes coverage of computer forensic tools and techniques, as well as methods individuals might use to combat them. It also covers use of disk-wiping software; methods to achieve anonymity online; techniques for managing security; and confidentiality, encryption, wireless security, and legal issues.
Carvey, Harlan (author) and Dave Kleiman (technical editor): Windows Forensic Analysis Including DVD Toolkit, Syngress, May 2007, ISBN-13: 978-159749156.
An in-depth excursion into computer forensics on Windows systems that includes a reasonably comprehensive forensics toolkit on DVD as part of the package. It's not unreasonable to view the book as the background and instructions for use of the on-DVD toolkit, and the toolkit itself as the means whereby readers can learn about and gain experience in performing all kinds of computer forensics tasks. An excellent addition to any InfoSec bookshelf, thanks to its in-depth and competent analyses and explanations.
Cheswick, William R, Steven M. Bellovin, and Aviel D. Rubin: Firewalls and Internet Security: Repelling the Wily Hacker, 2e, Addison-Wesley, 2003, ISBN-13: 978-0201634662.
A very welcome second edition of a great first edition book, this tome includes great coverage of IP security topics and its excellent analysis of a computer attack and its handling. The firewall coverage is superb, but the authors' coverage of Internet security topics and techniques is also timely, interesting, and informative. It is an outstanding update to an already terrific book.
Cooper, Mark et al.: Intrusion Signatures and Analysis, New Riders, 2001, ISBN-13: 978-0735710635.
In this book, numerous network and system attacks are documented and described, along with methods that administrators can use to recognize ("identify a signature," as it were) and deal with such attacks. Aimed in part at helping individuals seeking the GIAC Certified Intrusion Analyst (GCIA) certification, the book explores a large catalogue of attacks, documents the tools that intruders use to mount them, and explains how to handle or prevent them. By working from protocol traces, or intrusion detection or firewall logs, the book also teaches skills for recognizing, analyzing, and responding to attacks.
Crothers, Tim: Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network, Wiley, 2002, ISBN-13: 978-0764549496.
Though many books talk about intrusion detection systems, this one stands out for several reasons. First, it's short, concise, and direct: a great introduction to the topic. Second, it's leavened with good advice and best practices on deploying and using IDS technology, and includes great diagrams and explanations. It's probably not the only book you'll want on this topic, but it's a great place to start digging in.
Dhanjani, Nitesh, Billy Rios, and Brett Hardin: Hacking: The Next Generation (Animal Guide), O'Reilly, September 2009, ISBN-13: 978-0596154578.
Coming in at a trim 309 pages, this O'Reilly guide is chockfull of perspectives from the attacker's point of view. The authors provide concise, practical information on attack vectors (several even seasoned techies might not have considered) focused not only on computers and networks but also on mobile devices and cloud services. Written in plain English and liberally sprinkled with interesting, real-world examples, Hacking: The Next Generation is a good read and excellent addition to your library.
Ferguson, Niels, Bruce Schneier, and Tadayoshi Kohno: Cryptography Engineering: Design Principles and Practical Applications, Wiley, 2010, ISBN-13: 978-0470474242.
An outstanding update to Schneier's previous second edition of Applied Cryptography, this book includes much of the same information and coverage, but aims more at laying out the principles of strong, secure cryptographic design and implementation. Among other things, it's often used as a graduate textbook for students in computer science or engineering, to help them understand issues involved in using and implementing cryptography within various software systems. It's probably the best and most up-to-date introduction to cryptography within the "let's use cryptography to do something" context around.
Garfinkel, Simson, Alan Schwartz, and Gene Spafford: Practical UNIX and Internet Security, 3e, O'Reilly, 2003, ISBN-13: 978-0596003234.
Several editions later, this book remains one of the best general security administration books around. It starts with the fundamentals of security and UNIX, works its way through security administration topics and techniques clearly and systematically, and includes lots of great supplementary information that's still quite useful today. While it's focused on a particular operating system and its inner workings, this book will be useful even for those who may not rub shoulders with UNIX every day.
Garfinkel, Simson: Web Security, Privacy, and Commerce, 2e, O'Reilly, 2002, ISBN-13: 978-0596000455.
This book tackles the real root causes behind well-publicized attacks and exploits on websites and servers right from the front lines. Explains the sources of risk and how those risks can be managed, mitigated, or sidestepped. Topics covered include user safety, digital certificates, cryptography, web server security and security protocols, and e-commerce topics and technologies. It's a great title for those interested in Web security matters.
Gollman, Dieter: Computer Security, 2e, John Wiley Sons, December 2006, ISBN-13: 978-0470862933.
This book surveys computer security topics and issues from a broad perspective starting with the notion of security models. It also covers what's involved in security operating and database systems, as well as networks. This book is widely adopted as an upper-division undergraduate or introductory graduate level textbook in computer science curricula, and also includes a comprehensive bibliography.
Gregg, Michael: Build Your Own Security Lab: A Field Guide for Network Testing, Wiley, April 2008, ISBN-13: 978-0470179864.
This book contains a complete set of guidelines for acquiring, assembling, installing, and operating an information security laboratory. It gives excellent coverage of attack tools and techniques, and how to counter them on Windows systems and networks.
Harris, Shon: CISSP All-in-One Exam Guide, 5e, Osborne McGraw-Hill, January 2010, ISBN-13: 978-0071602174.
Numerous other titles cover the CISSP exam (including a book of my own), but this is the only one that earns high ratings from both security professionals and ordinary book buyers. It covers all 10 domains in the Common Body of Knowledge (CBK) that is the focus of the CISSP exam, but also includes lots of examples, case studies, and scenarios. Where other books summarize, digest, and condense the information into almost unrecognizable forms, this book is well written, explains most key topics, and explores the landscape that the CISSP covers very well. Those with InfoSec training or backgrounds may be able to use this as their only study tool, but those who lack such background must read more widely. Value-adds to this book include the accompanying simulated practice exams and video training on the CD.
The Honeynet Project: Know Your Enemy: Learning About Security Threats, 2e, Addison-Wesley, 2004, ISBN-13: 978-0321166463.
In computer security jargon, a honeypot is a system designed to lure and snare would-be intruders; by extension, a honeynet is a network designed to do the same thing. The original Honeynet Project involved two years of effort from security professionals who set up and monitored a set of production systems and networks designed to be compromised. The pedigree of the group involved is stellar, and so are their results in this second edition, which shares the results of their continuing and detailed observations of attacks and exploits, and their recommendations on how to deal with such phenomena.
Kahn, David: The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, Scribner, 1996, ISBN-13: 978-0684831305.
If you're looking for a single, comprehensive, and exhaustive treatment of cryptography, this is the book for you. Kahn starts with simple substitution ciphers that go all the way back to the invention of writing in the Tigris/Euphrates cultures to techniques used in the present day. Be warned that this book is rather more historical and descriptive in its coverage than it is a how-to book, but it is absolutely the right place to start for those who are interested in this topic and who want to get the best possible background before diving into more technical detail.
Komar, Brian: Windows Server 2008 PKI and Certificate Security, Microsoft Press, April 2008, ISBN-13: 978-0735625167.
A wealth of information and practical advice on using Windows Server 2008 to design and deploy certificate-based security solutions, including coverage of wireless networks, smart card authentication, VPNs, secure e-mail, Web SSL, EFS, and code-signing applications.
Kruse, Warren G. and Jay Heiser: Computer Forensics: Incident Response Essentials, Addison-Wesley, 2001, ISBN-13: 978-0201707199.
A perennial computer security buzzword is "incident response" or "incident handling," meaning the activities involved in detecting and responding to attacks or security breaches. This book describes a systematic approach to implementing incident responses, and focuses on intruder detection, analysis of compromises or damages, and identification of possible culprits involved. The emphasis is as much on preparing the "paper trail" necessary for successful prosecution of malefactors as it is in exploring the principles involved in formulating incident response teams, strategies, security enhancements, and so forth. Coverage extends to analyses of attack tools and strategies, as well as monitoring and detecting tools and techniques. It's an interesting read, and a very useful book.
Malin, Cameron H., Eoghan Casey, and James M. Aquilina: Malware Forensics: Investigating and Analyzing Malicious Code, Syngress, June 2008, ISBN-13: 978-1597492683.
Written by a team of practicing and heavily experienced professionals in the malware forensics field (Malin is with the FBI, Casey is a full-time forensics writer and teacher, and Aquilina is a senior attorney who investigates and litigates computer forensics related cases), this book is a tour-de-force exploration into the hows, whys, and wherefores of malware forensics analysis. The authors are every bit as strong on technical forensics as they are on malware, and that double coverage plays well throughout this entire book. Those looking for a learning tool and a practical handbook could do a lot worse than buying this book.
McClure, Stuart, Joel Scambray, and George Kurtz: Hacking Exposed: Network Security Secrets & Solutions, 6e, Osborne McGraw-Hill, January 2009, ISBN-13: 979-0071613743.
One of the best-selling computer security books of all time, this latest edition updates the authors' catalogue of hacker tools, attacks, and techniques with a keen eye on taking the right defensive posture. By operating system and type of attack, readers learn about what tools are used for attacks, how they work, what they can reveal or allow, and how to defend systems and networks from their illicit use. The sixth edition includes only Windows Vista and Server 2008 security issues and answers. A companion CD-ROM includes tools, Web pointers, and other text supplements.
Melber, Derek: Auditing Security and Controls of Windows Active Directory Domains, Institute of Internal Auditors (IIA) Research Foundation, May 2005, ISBN-13: 978-0894135637.
This is one of the few really detailed and useful references that explain how the Windows Active Directory environment maps to security and controls auditing requirements, for the IIA in particular, and for more general auditing principles and practices. Melber is an accomplished and talented Windows internals expert and shows off his skills to good effect in this short but useful book. (See also his excellent Web site.)
Mitnick, Kevin D. and William L. Simon: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, Wiley, December 2005, ISBN-13: 978-0471782667.
As an uberhacker himself, Mitnick is well-placed to draw on his own knowledge and experience in reporting on hack attacks and exploits. Bill Simon is an award-winning and highly accomplished writer who also collaborated with Mitnick on a previous book, The Art of Deception, wherein he recounts his own exploits. This time, rather than being fictionalized, this book reports on and analyzes attacks and exploits lifted from the news pages. Well worth reading for anyone interested in incident response, and in understanding the mentality and mindset of those who might attack or attempt to penetrate system security.
Moeller, Robert: IT Audit, Control, and Security, Wiley, November 2010, ISBN-13: 978-0471406761.
Just coming off the presses as this article was updated, this book covers auditing concepts, controls, and regulations, and then dives into step-by-step instructions on auditing processes. From CobiT and COSO to ITIL to Val IT, consider this a good general reference as well as a practical guide.
Moskowitz, Jeremy: Group Policy: Fundamentals, Security, and Troubleshooting, Sybex, May 2008, ISBN-13: 978-0470275894.
In no other way does Windows offer as close to a comprehensive and remotely manageable toolset for Windows security and behavior as through Group Policy objects and settings. Moskowitz provides a wealth of useful information on using Group Policy to establish, manage, and maintain security on Windows networks. It's an invaluable reference and learning tool.
Northcutt, Stephen and Judy Novak: Network Intrusion Detection, 3e, New Riders, September 2002, ISBN-13: 978-0735712652.
This short but information-packed book works its way through numerous real, documented system attacks to teach about tools, techniques, and practices that will aid in the recognition and handling of so-called "security incidents." The authors make extensive use of protocol traces and logs to explain what kind of attack took place, how it worked, and how to detect and deflect or foil such attacks. Those who work through this book's recommendations should be able to foil the attacks it documents, as they learn how to recognize, document, and respond to potential future attacks. It's one of the best books around for those who must configure router filters and responses, monitor networks for signs of potential attack, or assess possible countermeasures for deployment and use.
Northcutt, Stephen et al.: Inside Network Perimeter Security, 2e, New Riders, March 2005, ISBN-13: 978-0672327377.
Readers will enjoy the broad yet deep coverage this book offers regarding all aspects of network perimeter protection. The authors skillfully teach the reader how to "think" about security issues―threats, hack attacks, exploits, trends, and so on―rather than handhold the reader with step-by-step solutions to specific problems. This approach helps network security professionals learn how to use a variety of tools, analyze the results, and make effective decisions. Topics covered include designing and monitoring network perimeters for maximum security, firewalls, packet filtering, access lists, and expanding or improving the security of existing networks. Because the book was developed jointly with SANS Institute staff, it can be used as a study aid for individuals preparing for GIAC Certified Firewall Analyst (GCFW) certification.
Pfleeger, Charles P. and Shari Lawrence Pfleeger: Security in Computing, 4th Edition, Prentice Hall, October 2006, ISBN-13: 978-0132390774.
Often selected as an upper-division undergraduate or graduate textbook but useful to the practitioner, Security in Computing provides general-purpose coverage of the computer security landscape. The authors focus more on the "why" and "how" of security topics rather than the "how to."
Peltier, Thomas R.: Information Security Risk Analysis, 3e, March 2010, Auerbach, ISBN-13: 978-1439839560.
The techniques introduced in this book permit its readers to recognize and put price tags on potential threats to an organization's computer systems, be they malicious or accidental in nature. It covers the well-known FRAAP (facilitated risk analysis and assessment process) as it takes a step-by-step approach to identifying, assessing, and handling potential sources of risk.
Rada, Roy: HIPAA @ IT Essentials, 2003 Edition: Health Information Transactions, Privacy, and Security, Hypermedia Solutions, October 2002, ISBN-13: 978-1901857191.
HIPAA stands for the Health Insurance Portability and Accountability Act of 1996, a maze of U.S. government regulations that surround the electronic packaging, storage, use, and exchange of medical records. Because HIPAA has a surprising reach into the private sector (it affects any business that handles medical records in any way), this topic receives coverage on most security certification exams and is of concern to IT professionals in general. This book is designed as a reference for such professionals and succeeds admirably in its purpose; basically, it condenses and explains what it takes the U.S. government thousands of pages to document in fewer than 300 pages.
Raina, Kapil: PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues, Wiley, April 2003, ISBN-13: 978-0471314292.
This book is a relatively brief (336 pages) but cogent introduction to the public key infrastructure standards, along with best practices for their use and application.
Russell, Deborah and G. T. Gangemi: Computer Security Basics, O'Reilly, 1991, ISBN: 0937175714.
In a clear sign that this book lives up to its title, it's still around (and in print) nearly 20 years after its initial release. It's an excellent primer on basic security concepts, terminology, and tools. This book covers key elements of the U.S. government's security requirements and regulations as well. Although dated, it also provides useful coverage of security devices, as well as communications and network security topics. Many experts recommend this title as an ideal "my first computer security book."
Schneier, Bruce: Applied Cryptography, Wiley, 1996, ISBN-13: 978-0471117094.
Although many good books on cryptography are available (others appear in this list), none of the others approaches this one for readability and insight into the subject matter. This book covers the entire topic as completely as possible in a single volume, and includes working code examples for most encryption algorithms and techniques (which makes an interesting alternative to more common mathematical formulae and proofs so common to this subject). Even so, the book is informative, useful, and interesting even for those who do not read the code.
Schneier, Bruce: Schneier on Security, Wiley, September 2008, ISBN-13: 9798-0470495356.
Now touted as the "world's most famous security expert," Schneier once again presents a collection of his recent security musings and essays in book form. Here he takes on passports, voting machines, airplanes and airport security, ID cards, Internet banking, and a whole lot more, for a thought-provoking and interesting take on topical security subjects.
Schneier, Bruce: Secrets and Lies: Digital Security in a Networked World, Wiley, 2004, ISBN-13: 978-0471453802.
A well-known and respected figure in the field of computer and network security, Schneier brings his unique perspective to the broad topic of digital security matters in this book. He manages to be informative and interesting, often funny, on topics normally known for their soporific value. He also presents an interesting philosophy on "security as a perspective or a state of mind" rather than as a recipe for locking intruders, malefactors, or others out of systems and networks. Along the way, he also presents a useful exposition of the tools, techniques, and mind games hackers use to penetrate systems and networks around the world. One of the best possible choices on this list for "my first computer security book―except that other titles (even those on this list) will have a mighty tough act to follow!
Solomon, Michael G., K. Rudolph, Diane Barrett, and Neil Broom: Computer Forensics JumpStart, 2e, Sybex, January 2011, ISBN-13: 9780470931660.
The upcoming revision to this popular introductory book on Computer Forensics might have been written with CISSP exam preparation in mind. It covers all the basic principles, practices, and procedures related to this field, and provides a nice overview of the items in a professional's forensics toolkit as well.
Whitman, Michael E., Herbert J. Mattord, Richard Austin, and Greg Holden: Guide to Firewalls and Network Security, Course Technology, June 2008, ISBN-13: 978-1435420168.
This second-edition textbook provides a good foundation for people new to network security and firewalls. You're first introduced to InfoSec and network security concepts, and then dive into firewall planning, policies, implementation, configuration, and filtering. The authors include detailed chapters on encryption, authentication, VPNs, and intrusion detection, and then wind down with a look at digital forensics.
Here are some additional interesting InfoSec bibliographies, if you'd like to see other takes on this subject matter (you'll find more in the second part of this story as well):
The Security section of the Informit bookstore has more than 100 security-related titles to choose from.
If you use the Search utility in the books area at Amazon.com (http://www.amazon.com/), in addition to producing hundreds of books in response to a title search on "computer security," it will produce more than a dozen book lists on the topic as well.
You can also find security-related titles at Barnes and Noble (http://www.barnesandnoble.com).
Please send me feedback on my selections, including your recommendations for possible additions or deletions. I can't say I'll act on all such input, but I will consider all of it carefully.
And be sure to read part 2 of this two-part series.
All patients received weekly infusions of recombinant human α-L-iduronidase for 52 weeks. The mean activity of α-L-iduronidase in leukocytes was 0.04 U per milligram before treatment and 4.98 U per milligram, or 15 percent of normal, an average of seven days after an infusion of α-L-iduronidase (i.e., immediately before the next infusion). Enzyme activity was not detectable in brushings of buccal mucosa before treatment, but seven days after an infusion, it reached a level of 1 percent of normal.
Five patients (Patients 1, 4, 5, 6, and 7) had transient urticaria on the trunk, face, arms, and legs during an infusion given during week 4 or later, and in four patients (Patients 1, 5, 6, and 7) it recurred during subsequent infusions beginning at or after week 20. During these episodes, urticaria began midway through an infusion but resolved soon after the infusion was completed. In the four patients with recurrent urticaria, the episodes eventually became less frequent and less severe and finally stopped. In three patients (Patients 1, 5, and 6), the urticaria was accompanied by angioedema (thickening of the tongue and tightening of the throat) on a total of nine occasions and by moderate transient hypoxemia on three occasions. Patient 8 had one episode of facial swelling without urticaria during the infusion at week 47. These symptoms usually resolved about one hour after the infusion was stopped. In patients with recurrent urticaria, the rate of enzyme infusion was decreased or the dose temporarily reduced, and they were given increased medications such as diphenhydramine before, and in some cases during, an infusion.
Four patients (Patients 2, 7, 8, and 9) had biochemical evidence of complement activation during infusions given at weeks 6 and 12, as evidenced by decreased serum total complement activity (i.e., decreased CH100) and decreased C3 or C4 concentrations after infusions. Although these patients were usually asymptomatic, Patient 8 had fever, chills, and “fussy behavior” on three occasions. By week 26, there was no complement activation during infusion in any patient. In the four patients who had transient complement activation, serum α-L-iduronidase antibodies were detected by week 8, but the antibody levels subsequently declined or became undetectable. The antibodies did not immunoprecipitate native enzyme and did not inhibit enzyme activity in vitro (Anand VA, Kakkis ED: unpublished data), nor did they alter efficacy in vivo on the basis of urinary glycosaminoglycan excretion. In all 10 patients IgG antibodies developed to Chinese-hamster-ovary cell proteins that were present as a trace impurity in the enzyme preparation, but clinically important adverse events were not correlated with the presence or titer of these antibodies. There were no abnormalities in blood counts, serum chemical values, or urinalysis during treatment. Other mucopolysaccharidosis-related complications during treatment consisted of cervical subluxation requiring cervical fusion, mitral-valve replacement with coronary bypass grafting, repeated lumbar fusion, and a ventriculoperitoneal shunt, each in one patient.Reduction in Lysosomal Storage Figure 1. Figure 1. Changes in Liver Size in Patients with Mucopolysaccharidosis I during α-l-Iduronidase Therapy.
Liver size was measured in terms of volume and expressed as the percentage of body weight, given a density of 1 g per milliliter of tissue. Patient 9 had an episode of hepatitis at 26 weeks that was believed to be due to a concomitantly taken medication and that resolved by week 30. This episode was thought to account for the transient increase in the size of her liver. The upper bounds of the 95 percent confidence interval of normal values (i.e., within the normal range for age, as adapted from the data of Stocker and Dehner23) are 3.5 percent for boys 5 to 12 years of age, 3.2 percent for girls 5 to 12 years of age, 2.2 percent for boys 13 to 17 years of age, 2.7 percent for girls 13 to 17 years of age, 2.6 percent for men 18 years of age or older, and 2.9 percent for women 18 years of age or older.
Liver volume decreased by 19 to 37 percent from base line in nine patients and by 5 percent in one patient at 52 weeks; the mean decrease was 25 percent (P<0.001). By 26 weeks, the size of the liver was normal for body weight and age in eight patients (Figure 1). In the two patients (Patients 6 and 9) who had the largest liver size relative to body weight at base line, the size of the liver was close to normal at 52 weeks (3.2 and 3.3 percent of body weight, respectively).
In eight patients the size of the spleen decreased by 13 to 42 percent from base line. The mean decrease was 20 percent among all 10 patients (P<0.001).
Urinary glycosaminoglycan excretion declined rapidly after 3 to 4 weeks of treatment, and by 8 to 12 weeks it was 60 to 80 percent below the base-line values. At 52 weeks, the mean reduction was 63 percent (range, 53 to 74 percent; P<0.001). The excess urinary glycosaminoglycan excretion (that above the upper limit of the normal value for age) was reduced by a mean of 80 percent in these patients. The results were confirmed by an assay of uronic acids and N-sulfate (a test specific for heparan sulfate). Electrophoretic studies of urine revealed a significant reduction in the excretion of heparan sulfate and dermatan sulfate, but the excretion of dermatan sulfate was still greater than normal in all patients.Clinical Studies Increases in Height and Weight Table 2. Table 2. Height and Weight of Six Prepubertal Patients before Enzyme-Replacement Therapy and after One Year of Therapy.
The height increased by a mean of 6.0 cm (5 percent) in the six prepubertal patients, and their mean rate of growth in height increased from 2.80 cm per year to 5.17 cm per year during treatment (P=0.01) (Table 2). For all 10 patients, body weight increased by a mean of 3.2 kg (9 percent), and the mean increase was 4.2 kg (17 percent) among the 6 prepubertal patients. In these six patients, the mean rate of growth in weight increased from 1.66 kg per year before treatment to 3.83 kg per year during treatment (P=0.04) (Table 2).Range of Motion Figure 2. Figure 2. Mean Changes in the Restriction of Range of Motion of Shoulder Flexion (Panel A), Elbow Extension (Panel B), and Knee Extension (Panel C) in Patients with Mucopolysaccharidosis I during α-l-Iduronidase Therapy.
The mean degrees of restriction in the range of motion of right- and left-shoulder flexion are not shown for two patients, because shoulder flexion was not evaluated in these two patients at base line. The values represent the difference between the normal maximal range of motion for age and the measured value.
Restriction of shoulder flexion decreased during treatment in six of the eight patients in whom it was evaluated at base line. The mean decrease in joint restriction was 28 degrees in the right shoulder (P< 0.001) and 26 degrees in the left shoulder (P=0.002) (Figure 2A). Among all 10 patients, the degree of restriction of elbow extension decreased by a mean of 7.0 degrees in the right elbow (P=0.03) and 7.0 degrees in the left elbow (P=0.007) (Figure 2B). The degree of restriction of knee extension decreased by a mean of 3.2 degrees on the right (P=0.10) and 3.0 degrees on the left (P=0.09) in the 10 patients (Figure 2C).
Analysis in individual patients revealed that the joints with the greatest degree of restriction before treatment had the greatest improvement. For example, at base line, Patients 5, 9, and 10 could not flex their shoulders beyond 100 degrees, and the range of motion increased by 21 to 51 degrees after treatment. The improvements in the range of motion were accompanied by patient-reported increases in physical activities, such as being able to wash their hair, hold a hamburger normally, hang from monkey bars, and play sports better.Airway Function
Seven of the 10 patients had apnea, and these 7 had a decrease in the number of episodes of apnea and hypopnea during treatment, from 155 per night to 60 per night (a 61 percent decrease), with a change in the mean apnea–hypopnea index from 2.1 to 1.0 event per hour. Three of these seven (Patients 2, 6, and 9) had clinically important sleep apnea, and in all three this disorder improved during treatment. In Patient 2, the apnea–hypopnea index decreased from 4.5 events per hour at base line to 0.4 event per hour at 26 weeks, and the total length of time during sleep in which oxygen desaturation fell below 89 percent decreased from 48 minutes to 1 minute per night. At base line, Patient 6 required continuous positive airway pressure at night because of severe desaturation (with continuous positive airway pressure, the oxygen saturation was below 89 percent during 61 of 368 minutes of sleep). After 52 weeks of treatment, oxygen saturation was less than 89 percent for only 8 of 332 minutes of sleep, and continuous positive airway pressure was not used. Patient 9 had an apnea–hypopnea index of 9.5 events per hour before treatment and 4.0 events per hour after 26 weeks of treatment. In Patient 8, the initial apnea–hypopnea index of 0.1 event per hour increased to 3.1 events per hour at 26 weeks and to 9.3 events per hour at 52 weeks for reasons that were unclear. Eight of 10 patients or their families reported that their breathing had improved, and 5 of 7 reported quieter nighttime breathing, an improved quality of sleep, and decreased daytime somnolence.Cardiac Function Figure 3. Figure 3. Changes in New York Heart Association (NYHA) Functional Class in Patients with Mucopolysaccharidosis I during α-l-Iduronidase Therapy.
The changes in scores were based on information obtained from serial interviews with the patients. New York Heart Association class I indicates no symptoms with ordinary activity; class II, symptoms with ordinary activity and a slight limitation of activity; class III, symptoms with less-than-ordinary activity and marked limitation of activity; and class IV, symptoms with any type of activity or at rest. The difference between pretreatment scores and scores at 52 weeks was significant (P=0.002).
The New York Heart Association functional classification was determined by serial interviews with the patients. All 10 patients reported an improvement by one or two classes (Figure 3), but there was no objective data from echocardiographic studies to verify direct cardiac benefit. The improved functional scores may reflect improvements in aspects of the disease other than cardiac function. When base-line echocardiograms were compared with those obtained after 52 weeks of treatment, tricuspid regurgitation or pulmonic regurgitation was decreased in four patients, but mitral regurgitation worsened in two patients (Patients 2 and 7). At base line, Patient 6 had atrial flutter and clinical signs of cardiac failure, including dyspnea at rest and pitting edema. After 12 weeks of treatment, he had sinus rhythm with first-degree block and his dyspnea at rest and pitting edema had resolved.Symptomatic Changes
Before treatment, all 10 patients reported a lack of endurance and limitations in their ability to perform daily activities, but exercise tolerance was not formally tested. During treatment, all patients had improved endurance and fewer limitations in their ability to perform daily activities, and after 26 weeks of treatment, many were able to walk farther, run, and play sports. Patients 3, 4, and 5 reported the resolution of severe, incapacitating headaches after 6 to 12 weeks of treatment.Ophthalmic Changes
The extent of corneal clouding did not change in any of the eight patients with this problem. Several patients reported decreased photophobia or conjunctival irritation. Visual acuity improved from 20/1000 to 20/200 (in one eye) in one patient and slightly in two others.
3COM [8 Certification Exam(s) ]
AccessData [1 Certification Exam(s) ]
ACFE [1 Certification Exam(s) ]
ACI [3 Certification Exam(s) ]
Acme-Packet [1 Certification Exam(s) ]
ACSM [4 Certification Exam(s) ]
ACT [1 Certification Exam(s) ]
Admission-Tests [13 Certification Exam(s) ]
ADOBE [93 Certification Exam(s) ]
AFP [1 Certification Exam(s) ]
AICPA [2 Certification Exam(s) ]
AIIM [1 Certification Exam(s) ]
Alcatel-Lucent [13 Certification Exam(s) ]
Alfresco [1 Certification Exam(s) ]
Altiris [3 Certification Exam(s) ]
Amazon [2 Certification Exam(s) ]
American-College [2 Certification Exam(s) ]
Android [4 Certification Exam(s) ]
APA [1 Certification Exam(s) ]
APC [2 Certification Exam(s) ]
APICS [2 Certification Exam(s) ]
Apple [69 Certification Exam(s) ]
AppSense [1 Certification Exam(s) ]
APTUSC [1 Certification Exam(s) ]
Arizona-Education [1 Certification Exam(s) ]
ARM [1 Certification Exam(s) ]
Aruba [6 Certification Exam(s) ]
ASIS [2 Certification Exam(s) ]
ASQ [3 Certification Exam(s) ]
ASTQB [8 Certification Exam(s) ]
Autodesk [2 Certification Exam(s) ]
Avaya [101 Certification Exam(s) ]
AXELOS [1 Certification Exam(s) ]
Axis [1 Certification Exam(s) ]
Banking [1 Certification Exam(s) ]
BEA [5 Certification Exam(s) ]
BICSI [2 Certification Exam(s) ]
BlackBerry [17 Certification Exam(s) ]
BlueCoat [2 Certification Exam(s) ]
Brocade [4 Certification Exam(s) ]
Business-Objects [11 Certification Exam(s) ]
Business-Tests [4 Certification Exam(s) ]
CA-Technologies [21 Certification Exam(s) ]
Certification-Board [10 Certification Exam(s) ]
Certiport [3 Certification Exam(s) ]
CheckPoint [43 Certification Exam(s) ]
CIDQ [1 Certification Exam(s) ]
CIPS [4 Certification Exam(s) ]
Cisco [318 Certification Exam(s) ]
Citrix [48 Certification Exam(s) ]
CIW [18 Certification Exam(s) ]
Cloudera [10 Certification Exam(s) ]
Cognos [19 Certification Exam(s) ]
College-Board [2 Certification Exam(s) ]
CompTIA [76 Certification Exam(s) ]
ComputerAssociates [6 Certification Exam(s) ]
Consultant [2 Certification Exam(s) ]
Counselor [4 Certification Exam(s) ]
CPP-Institue [2 Certification Exam(s) ]
CPP-Institute [2 Certification Exam(s) ]
CSP [1 Certification Exam(s) ]
CWNA [1 Certification Exam(s) ]
CWNP [13 Certification Exam(s) ]
CyberArk [1 Certification Exam(s) ]
Dassault [2 Certification Exam(s) ]
DELL [11 Certification Exam(s) ]
DMI [1 Certification Exam(s) ]
DRI [1 Certification Exam(s) ]
ECCouncil [21 Certification Exam(s) ]
ECDL [1 Certification Exam(s) ]
EMC [129 Certification Exam(s) ]
Enterasys [13 Certification Exam(s) ]
Ericsson [5 Certification Exam(s) ]
ESPA [1 Certification Exam(s) ]
Esri [2 Certification Exam(s) ]
ExamExpress [15 Certification Exam(s) ]
Exin [40 Certification Exam(s) ]
ExtremeNetworks [3 Certification Exam(s) ]
F5-Networks [20 Certification Exam(s) ]
FCTC [2 Certification Exam(s) ]
Filemaker [9 Certification Exam(s) ]
Financial [36 Certification Exam(s) ]
Food [4 Certification Exam(s) ]
Fortinet [13 Certification Exam(s) ]
Foundry [6 Certification Exam(s) ]
FSMTB [1 Certification Exam(s) ]
Fujitsu [2 Certification Exam(s) ]
GAQM [9 Certification Exam(s) ]
Genesys [4 Certification Exam(s) ]
GIAC [15 Certification Exam(s) ]
Google [4 Certification Exam(s) ]
GuidanceSoftware [2 Certification Exam(s) ]
H3C [1 Certification Exam(s) ]
HDI [9 Certification Exam(s) ]
Healthcare [3 Certification Exam(s) ]
HIPAA [2 Certification Exam(s) ]
Hitachi [30 Certification Exam(s) ]
Hortonworks [4 Certification Exam(s) ]
Hospitality [2 Certification Exam(s) ]
HP [752 Certification Exam(s) ]
HR [4 Certification Exam(s) ]
HRCI [1 Certification Exam(s) ]
Huawei [21 Certification Exam(s) ]
Hyperion [10 Certification Exam(s) ]
IAAP [1 Certification Exam(s) ]
IAHCSMM [1 Certification Exam(s) ]
IBM [1533 Certification Exam(s) ]
IBQH [1 Certification Exam(s) ]
ICAI [1 Certification Exam(s) ]
ICDL [6 Certification Exam(s) ]
IEEE [1 Certification Exam(s) ]
IELTS [1 Certification Exam(s) ]
IFPUG [1 Certification Exam(s) ]
IIA [3 Certification Exam(s) ]
IIBA [2 Certification Exam(s) ]
IISFA [1 Certification Exam(s) ]
Intel [2 Certification Exam(s) ]
IQN [1 Certification Exam(s) ]
IRS [1 Certification Exam(s) ]
ISA [1 Certification Exam(s) ]
ISACA [4 Certification Exam(s) ]
ISC2 [6 Certification Exam(s) ]
ISEB [24 Certification Exam(s) ]
Isilon [4 Certification Exam(s) ]
ISM [6 Certification Exam(s) ]
iSQI [7 Certification Exam(s) ]
ITEC [1 Certification Exam(s) ]
Juniper [65 Certification Exam(s) ]
LEED [1 Certification Exam(s) ]
Legato [5 Certification Exam(s) ]
Liferay [1 Certification Exam(s) ]
Logical-Operations [1 Certification Exam(s) ]
Lotus [66 Certification Exam(s) ]
LPI [24 Certification Exam(s) ]
LSI [3 Certification Exam(s) ]
Magento [3 Certification Exam(s) ]
Maintenance [2 Certification Exam(s) ]
McAfee [8 Certification Exam(s) ]
McData [3 Certification Exam(s) ]
Medical [69 Certification Exam(s) ]
Microsoft [375 Certification Exam(s) ]
Mile2 [3 Certification Exam(s) ]
Military [1 Certification Exam(s) ]
Misc [1 Certification Exam(s) ]
Motorola [7 Certification Exam(s) ]
mySQL [4 Certification Exam(s) ]
NBSTSA [1 Certification Exam(s) ]
NCEES [2 Certification Exam(s) ]
NCIDQ [1 Certification Exam(s) ]
NCLEX [2 Certification Exam(s) ]
Network-General [12 Certification Exam(s) ]
NetworkAppliance [39 Certification Exam(s) ]
NI [1 Certification Exam(s) ]
NIELIT [1 Certification Exam(s) ]
Nokia [6 Certification Exam(s) ]
Nortel [130 Certification Exam(s) ]
Novell [37 Certification Exam(s) ]
OMG [10 Certification Exam(s) ]
Oracle [282 Certification Exam(s) ]
P&C [2 Certification Exam(s) ]
Palo-Alto [4 Certification Exam(s) ]
PARCC [1 Certification Exam(s) ]
PayPal [1 Certification Exam(s) ]
Pegasystems [12 Certification Exam(s) ]
PEOPLECERT [4 Certification Exam(s) ]
PMI [15 Certification Exam(s) ]
Polycom [2 Certification Exam(s) ]
PostgreSQL-CE [1 Certification Exam(s) ]
Prince2 [6 Certification Exam(s) ]
PRMIA [1 Certification Exam(s) ]
PsychCorp [1 Certification Exam(s) ]
PTCB [2 Certification Exam(s) ]
QAI [1 Certification Exam(s) ]
QlikView [1 Certification Exam(s) ]
Quality-Assurance [7 Certification Exam(s) ]
RACC [1 Certification Exam(s) ]
Real-Estate [1 Certification Exam(s) ]
RedHat [8 Certification Exam(s) ]
RES [5 Certification Exam(s) ]
Riverbed [8 Certification Exam(s) ]
RSA [15 Certification Exam(s) ]
Sair [8 Certification Exam(s) ]
Salesforce [5 Certification Exam(s) ]
SANS [1 Certification Exam(s) ]
SAP [98 Certification Exam(s) ]
SASInstitute [15 Certification Exam(s) ]
SAT [1 Certification Exam(s) ]
SCO [10 Certification Exam(s) ]
SCP [6 Certification Exam(s) ]
SDI [3 Certification Exam(s) ]
See-Beyond [1 Certification Exam(s) ]
Siemens [1 Certification Exam(s) ]
Snia [7 Certification Exam(s) ]
SOA [15 Certification Exam(s) ]
Social-Work-Board [4 Certification Exam(s) ]
SpringSource [1 Certification Exam(s) ]
SUN [63 Certification Exam(s) ]
SUSE [1 Certification Exam(s) ]
Sybase [17 Certification Exam(s) ]
Symantec [135 Certification Exam(s) ]
Teacher-Certification [4 Certification Exam(s) ]
The-Open-Group [8 Certification Exam(s) ]
TIA [3 Certification Exam(s) ]
Tibco [18 Certification Exam(s) ]
Trainers [3 Certification Exam(s) ]
Trend [1 Certification Exam(s) ]
TruSecure [1 Certification Exam(s) ]
USMLE [1 Certification Exam(s) ]
VCE [6 Certification Exam(s) ]
Veeam [2 Certification Exam(s) ]
Veritas [33 Certification Exam(s) ]
Vmware [58 Certification Exam(s) ]
Wonderlic [2 Certification Exam(s) ]
Worldatwork [2 Certification Exam(s) ]
XML-Master [3 Certification Exam(s) ]
Zend [6 Certification Exam(s) ]
Dropmark : http://killexams.dropmark.com/367904/11946626
Dropmark-Text : http://killexams.dropmark.com/367904/12898157
Blogspot : http://killexamsbraindump.blogspot.com/2017/12/pass4sure-st0-149-practice-tests-with.html
RSS Feed : http://feeds.feedburner.com/WhereCanIGetHelpToPassSt0-149Exam
Wordpress : https://wp.me/p7SJ6L-2jm
Box.net : https://app.box.com/s/a2mot1k00bfz8yx9ctqwinzr4wfct05i