Book description
IT Certification Success Exam Cram 2 provides you with a detailed explanation of the certification arena from Ed Tittel, one of the most respected figures in the industry. The book explains the various certification programs, their prerequisites, what can be done with them, and where you might want to go next. Readers preparing for a certification exam find the best-selling Exam Cram 2 series to be the smartest, most efficient way to become certified. This book focuses exactly on what you need to know to get certified now!
Table of contents
- Copyright
- A Note from Series Editor Ed Tittel
- About the Authors
- Acknowledgments
- We Want to Hear from You!
- Introduction
- 1. Certification Programs
- 2. Microsoft Certification Programs
- 3. Cisco Certification Programs
- 4. CompTIA Certification Programs
- 5. Oracle Certification Programs
- 6. Sun Certification Programs
- 7. Security Certifications
- 8. Linux Certification Programs
- 9. Novell Certification Programs
-
10. Prosoft's CIW Program
- The CIW Program
- CIW Associate
- CIW Professional
- The Master CIW Administrator Track
- Master CIW Enterprise Developer Track
- Master CIW Designer Track
- Master CIW Web Site Manager Track
- The i-Accelerate Program
- CIW Web Developer and Other jCert Job Role Certifications
- CIW Specialization Certificates
- More About CIW and Other Web Certifications
- CIW Testing
- How to Prepare for CIW Exams
- Need to Know More?
- 11. More Certification Programs
- 12. Planning Your Certifications
- 13. Certification Study Tips and Techniques
- A. Job Prospecting for the Newly Certified
- B. Glossary
Product information
- Title: IT Certification Success Exam Cram™ 2
- Author(s):
- Release date: January 2003
- Publisher(s): Pearson IT Certification
- ISBN: 9780789729231
You might also like
article
Twenty Years of Open Innovation
Organizations that practice open innovation draw on external resources to develop new ideas for products and …
book
Operational Assessment of IT
This book presents ideas and concepts of optimization designed to improve an organization's business processes and …
book
Using the Common Criteria for IT Security Evaluation
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the …
book
Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime
Protect yourself from identity theft! Nearly 17 million Americans were victimized by identity theft in 2012 …