Opportunities for Students – ACM

Hello guys!

Today, I am speaking as an Academic Student Ambassador and I want to present you an excellent opportunity, it’s about Association for Computing Machinery (ACM).

It’s an amazing opportunity and a great resources for Computer Science students who want to better themselves. So let’s keep this straight, shall we?

The list of benefits:

Screenshots (certifications + training):
trainings trainings2]

 

 

You can also find amazing books (unique books) that costs tens or hundreds of dollars piece but you can read them for free.

Training Path that contains hundreds of training.

[spoiler title=”Training list”]
.NET Overview: Windows, Web, and the Cloud
4G Communication Systems
4G Implementations
A+ Essentials 2009: Computer Hardware Components
A+ Essentials 2009: Configuring Displays, Peripherals, Laptops, and Printers
A+ Essentials 2009: Installing Windows Operating Systems (Windows 7 update)
A+ Essentials 2009: Operational Procedures and Preventative Maintenance
A+ Essentials 2009: Security and Network Fundamentals (IPv6 update)
A+ Essentials 2009: Troubleshooting Computers and Printers
A+ Essentials 2009: Using and Managing Windows (Windows 7 update)
ANSI C Programming: Data Representation
ANSI C Programming: Expressions
ANSI C Programming: Flow Control
ANSI C Programming: Functions
ANSI C Programming: Introducing C
ANSI C Programming: Pointers
ANSI C Programming: Processing Records
ANSI C Programming: Text Processing
ANSI C Programming: The Standard Library and Preprocessor
Access Control in Windows Server 2008 R2
Active Directory Certificate Services in Windows Server 2008
Active Directory Domain Services in Windows Server 2008 R2
Active Directory Objects in Windows Server 2008
Additional Active Directory Server Roles in Windows Server 2008
Administering Linux System Tasks and Backup Strategies
Administering the X Window System
Administrative and Documentation Tasks in Linux
Advanced HTML5
Advanced Schemas
Agile Programming and Testing
Ajax API Essentials
Ajax Applications and Server Communication
Ajax Basics
Authentication, Biometrics, and Security Controls
Beyond 3G (B3G)
Black-Box Software Testing Techniques
Business Continuity, Disaster Recovery, Security Training, and Forensics
C++ Programming: Classes and Data Abstraction
C++ Programming: Files and Streams
C++ Programming: Manipulating Objects
C++ Programming: Overloading
C++ Programming: Programming Techniques
C++ Programming: Structured Programming
CEH version 7 (Part 1 of 7): Hacking Basics
CEH version 7 (Part 2 of 7): Network Hacking
CEH version 7 (Part 3 of 7): Social Engineering
CEH version 7 (Part 4 of 7): Web Application Hacking
CEH version 7 (Part 5 of 7): Wireless Hacking
CEH version 7 (Part 6 of 7): Cryptography
CEH version 7 (Part 7 of 7): Attack and Penetration Testing
CISM 2012: Information Risk Management and Compliance (Part 1)
CISM 2012: Information Risk Management and Compliance (Part 2)
CISM 2012: Information Security Governance (Part 1)
CISM 2012: Information Security Governance (Part 2)
CISM 2012: Information Security Governance (Part 3)
CISM 2012: Information Security Incident Management (Part 1)
CISM 2012: Information Security Incident Management (Part 2)
CISM 2012: Information Security Program Development and Management (Part 1)
CISM 2012: Information Security Program Development and Management (Part 2)
CISM 2012: Information Security Program Development and Management (Part 3)
CISM 2012: Information Security Program Development and Management (Part 4)
CISM 2012: Information Security Program Development and Management (Part 5)
CISSP 2012 Domain: Access Control
CISSP 2012 Domain: Business Continuity and Disaster Recovery Planning
CISSP 2012 Domain: Cryptography
CISSP 2012 Domain: Information Security Governance and Risk Management
CISSP 2012 Domain: Legal, Regulations, Investigations, and Compliance
CISSP 2012 Domain: Operations Security
CISSP 2012 Domain: Physical (Environment) Security
CISSP 2012 Domain: Security Architecture and Design
CISSP 2012 Domain: Software Development Security
CISSP 2012 Domain: Telecommunications and Network Security
Cisco ICND1 1.1: Fundamentals of Networking
Cisco ICND1 1.1: Implementing Wireless LANs
Cisco ICND1 1.1: LAN Addressing
Cisco ICND1 1.1: Managing the Network Environment
Cisco ICND1 1.1: Network Connections and Communications
Cisco ICND1 1.1: Optimizing and Troubleshooting Switch Security
Cisco ICND1 1.1: Routing and Cisco Routers
Cisco ICND1 1.1: Switching in LANs
Cisco ICND1 1.1: The Packet Delivery Process, Router Security, and Remote Access
Cisco ICND1 1.1: WAN Encapsulation and RIP Routing
Cisco ICND1 1.1: WAN Technologies
Cisco ICND2 1.1: Configuring and Troubleshooting ACLs
Cisco ICND2 1.1: EIGRP Implementation
Cisco ICND2 1.1: Frame Relay Connections
Cisco ICND2 1.1: Implementing VLANS and Trunks
Cisco ICND2 1.1: Introducing ACL Operation
Cisco ICND2 1.1: Medium-Sized Routed Network Construction
Cisco ICND2 1.1: Scaling the Network with NAT and PAT
Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network
Cisco ICND2 1.1: Single-Area OSPF Implementation
Cisco ICND2 1.1: Spanning-Tree Protocol and Inter-VLAN Routing
Cisco ICND2 1.1: Transitioning to IPv6
Cisco ICND2 1.1: VPN and Point-to-Point WAN Connections
Cisco ICOMM 8.0: Administrator and End-User Interfaces
Cisco ICOMM 8.0: CUC Solutions
Cisco ICOMM 8.0: Call Flows in CUC Systems
Cisco ICOMM 8.0: Cisco Unified Communications Solution Maintenance
Cisco ICOMM 8.0: Cisco Unified Presence
Cisco ICOMM 8.0: Configuring Mobility Features
Cisco ICOMM 8.0: Enablement of Cisco Unity Connection and Voice Mailbox Options
Cisco ICOMM 8.0: End User Telephony and Mobility Features
Cisco ICOMM 8.0: Endpoint and User Administration
Cisco ICOMM 8.0: RTMT, Monitoring Voice Mail and the Disaster Recovery System
Cisco ROUTE 1.0 eLT: IPv6 Addressing and Unicast
Cisco ROUTE 1.0 eLT: IPv6 Transition Techniques
Cisco ROUTE 1.0 eLT: Implement RIPng, OSPFv3, EIGRP and Redistribution in IPv6
Cisco ROUTE 1.0 eLT: Implementing Path Control
Cisco ROUTE 1.0 eLT: NAT and PAT with IPv6
Cisco ROUTE 1.0 eLT: Routing for Branch Offices and Mobile Workers
Cisco ROUTE 1.0: Configuring and Verifying BGP operations
Cisco ROUTE 1.0: Configuring and Verifying Route Redistribution
Cisco ROUTE 1.0: Connecting the Enterprise to ISPs
Cisco ROUTE 1.0: EIGRP Authentication and Advanced Feature Implementation
Cisco ROUTE 1.0: EIGRP Implementation for the Enterprise
Cisco ROUTE 1.0: Implementing Path Control
Cisco ROUTE 1.0: Implementing an OSPF-Based Solution
Cisco ROUTE 1.0: Routing Services for Converged Networks
Cisco ROUTE 1.0: The OSPF Routing Protocol
Cisco SWITCH 1.0: Accommodating Voice and Video in Campus Networks
Cisco SWITCH 1.0: Analyzing Campus Network Designs
Cisco SWITCH 1.0: Configuring Layer 3 High Availability
Cisco SWITCH 1.0: Highly Available Networks
Cisco SWITCH 1.0: Implementing Spanning-Tree
Cisco SWITCH 1.0: Implementing VLANs in Campus Networks
Cisco SWITCH 1.0: Integrating Wireless LANs into a Campus Network
Cisco SWITCH 1.0: Inter-VLAN Routing
Cisco SWITCH 1.0: Minimizing Service Loss and Data Theft
Cisco TSHOOT 1.0 eLT: Troubleshooting Branch Office and Remote Worker Problems
Cisco TSHOOT 1.0 eLT: Troubleshooting DHCP
Cisco TSHOOT 1.0 eLT: Troubleshooting IPv6, OSPFv3, and RIPng
Cisco TSHOOT 1.0 eLT: Troubleshooting NAT and PAT
Cisco TSHOOT 1.0 eLT: Troubleshooting Network Applications Services
Cisco TSHOOT 1.0 eLT: Troubleshooting Performance Problems on Switches
Cisco TSHOOT 1.0 eLT: Troubleshooting Video Integration
Cisco TSHOOT 1.0 eLT: Troubleshooting Voice over IP Integration
Cisco TSHOOT 1.0: Maintaining and Troubleshooting Network Security Solutions
Cisco TSHOOT 1.0: Maintenance, Troubleshooting Tools, & Applications
Cisco TSHOOT 1.0: Network Layer Connectivity, OSPF, and EIGRP
Cisco TSHOOT 1.0: Planning Maintenance for Complex Networks
Cisco TSHOOT 1.0: Planning Troubleshooting Processes for Networks
Cisco TSHOOT 1.0: Route Redistribution, BGP, and Performance Issues
Cisco TSHOOT 1.0: Troubleshooting FHRPs and Performance Issues
Cisco TSHOOT 1.0: Troubleshooting VLANs, STP, and SVIs
Cisco TSHOOT v1.0 eLT Troubleshooting Wireless Integration
Cloud Computing Basics
Cloud Technology Enablers
Communications and Security in Windows Server 2008
CompTIA Network+ 2012: Network Installation and Configuration Part 1
CompTIA Network+ 2012: Network Installation and Configuration Part 2
CompTIA Network+ 2012: Network Management
CompTIA Network+ 2012: Network Media and Topologies Part 1
CompTIA Network+ 2012: Network Media and Topologies Part 2
CompTIA Network+ 2012: Network Security Part 1
CompTIA Network+ 2012: Network Security Part 2
CompTIA Network+ 2012: Network Security Part 3
CompTIA Network+ 2012: Networking Concepts Part 1
CompTIA Network+ 2012: Networking Concepts Part 2
Configuration Management, Risks, and Incidents in Software Testing
Configuring Access to Resources in Windows 7
Configuring DNS in Windows Server 2008
Configuring Hardware and Applications in Windows 7
Configuring Mobile Computing in Windows 7
Configuring Network Connectivity in Windows 7
Control Fundamentals and Security Threats
Control Project Communications (PMBOK® Guide Fifth Edition)
Controlling Changes and Closing a Project (PMBOK® Guide Fifth Edition)
Controlling Project Costs (PMBOK® Guide Fifth Edition)
Creating Secure Networks and Performing Security Assessments
Creating User Interfaces for Windows Applications with C# 2010
Creating User Interfaces for Windows Applications with Visual Basic 2010
Creating Windows Applications with C# 2010
Creating the Work Breakdown Structure (PMBOK® Guide Fifth Edition)
Cryptography and Public Key Infrastructures
Customizing and Managing Multithreaded Applications with C# 2010
Customizing and Managing Multithreaded Applications with Visual Basic 2010
DHTML and Cascading Style Sheets
Data Management, Localization, and Encryption in Linux
Defining and Sequencing Project Activities (PMBOK® Guide Fifth Edition)
Deploying Windows 7
Design for Six Sigma in the Organization
Designing and Maintaining LDAP Directory Services
Developing an Application Using User-Centered Design
Developing and Controlling the Project Schedule (PMBOK® Guide Fifth Edition)
Digital Payments
Direct, Monitor, and Control Project Work (PMBOK® Guide Fifth Edition)
Discovery, Routing, and RESTful Services in WCF 4 Applications with C# 2010
E-mail and Security in Linux
EMC Storage Products
Enterprise Data and Cloud Interaction
Estimating Activity Resources and Durations (PMBOK® Guide Fifth Edition)
Extending XML
Fibre Channel Storage Area Networks
Fundamentals of Software Testing
General Coding Best Practices
Getting Started with ADO.NET 4 Connections and Commands Using C# 2010
Getting Started with ADO.NET 4 DataSets Using C# 2010
Getting Started with Software Programming
Getting Started with WCF 4 Using C# 2010
Group Policy Objects Strategy in Windows Server 2008
Hardware Configurations for Linux
Hardware Requirements
IP Mobility
IP SANs and Content Addressed Storage
IPv6
ITIL® 2011 Edition Foundation: Continual Service Improvement
ITIL® 2011 Edition Foundation: ITIL® and the Service Lifecycle
ITIL® 2011 Edition Foundation: Introduction to Service Operation
ITIL® 2011 Edition Foundation: Service Design Fundamentals
ITIL® 2011 Edition Foundation: Service Design Processes
ITIL® 2011 Edition Foundation: Service Operation Processes
ITIL® 2011 Edition Foundation: Service Strategy Fundamentals
ITIL® 2011 Edition Foundation: Service Strategy Processes
ITIL® 2011 Edition Foundation: Service Transition Processes and Policies
ITIL® 2011 Edition Overview: Certification and Benefits
ITIL® 2011 Edition Overview: Creating a Service Culture
ITIL® 2011 Edition Overview: Introduction to the ITIL® Framework
Identifying Project Risks (PMBOK® Guide Fifth Edition)
Identity, Presence, and Privacy
Improvements to Role Services in Windows Server 2008 R2
Information Availability
Installing Linux
Installing, Upgrading, and Migrating to Windows 7
Integrated Initiation and Planning (PMBOK® Guide Fifth Edition)
Intelligent Storage Systems
Introducing Agile Software Development
Introducing Cloud Computing
Introducing User-Centered Design
Introduction to HTML5 and CSS3
Introduction to Hibernate
Introduction to Information Security
Introduction to Java EE 6
Introduction to Programming for Mobile Applications – Developing an Application for Android
Introduction to Programming for Mobile Applications – Developing an Application for iPhones
Introduction to Programming for Mobile Applications – Introducing Mobile Technology and Applications
Introduction to Ruby on Rails
Introduction to Software Program Design
Introduction to Storage Technology
Java Programming with Java SE 6.0: Basic GUI Development in Java
Java Programming with Java SE 6.0: Creating Classes in Java
Java Programming with Java SE 6.0: Exception Handling and Assertions
Java Programming with Java SE 6.0: Generics and Annotations
Java Programming with Java SE 6.0: Getting Started with Java
Java Programming with Java SE 6.0: Java Applets
Java Programming with Java SE 6.0: Java I/O
Java Programming with Java SE 6.0: Java Utilities
Java Programming with Java SE 6.0: Operators and Flow Control in Java
Java Programming with Java SE 6.0: Reference Types and Threading
Java Programming with Java SE 6.0: Working with Classes in Java
Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops
Java SE7 Fundamentals: Handling Errors and Deploying Applications
Java SE7 Fundamentals: Introduction to Java
Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts
Java SE7 Fundamentals: Variables, Operators, and Objects
Java SE7 New Features: I/O, Network, and Desktop Enhancements
Java SE7 New Features: Java Language and Technology Enhancements
Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization
Java SE7 Professional: Generics, Errors, and I/O
Java SE7 Professional: Syntax and Class Design
JavaScript Language Basics
JavaScript: Advanced Browser Scripting and DHTML
JavaScript: Browser Scripting Fundamentals
JavaScript: Functions and Regular Expressions
JavaScript: Objects and Object-oriented Programming
LDAP Fundamentals
Linux File Sharing and Filesystem Management
Linux Filesystem Management and File Sharing
Linux Hardware Configuration and System Maintenance
Linux Kernel Compilation and Linux Startup
Linux Kernel Compilation and System Startup
Linux Network Configuration
Linux Network Services
Linux Networking Configuration
Linux Networking Services
Linux Security
Linux System Customization and Automation
Linux System Maintenance and Hardware Configuration
Linux System Troubleshooting
Linux Troubleshooting
Linux User Notification and Device Management
Mail Transfer Agents and Accessibility in Linux
Maintaining Quality Code
Making Content Dynamic with DHTML
Management Improvements in Windows Server 2008 R2
Managing ADO.NET 4 Connections and Commands with C# 2010
Managing Agile Software Development
Managing Debian and Red Hat Packages
Managing Files in Linux
Managing Linux User and Group Accounts
Managing Procurements (PMBOK® Guide Fifth Edition)
Managing Project Human Resources (PMBOK® Guide Fifth Edition)
Managing Projects within Organizations (PMBOK® Guide Fifth Edition)
Managing and Controlling Stakeholder Engagement (PMBOK® Guide Fifth Edition)
Managing and Processing Text
Manipulating XML with the XML DOM and Ajax
Microsoft .NET Framework 4.0: ASP.NET MVC 2 with VB 2010
Microsoft .NET Framework 4.0: Client-Side Scripting and AJAX with VB 2010
Microsoft .NET Framework 4.0: Configuring and Deploying Web Applications with VB 2010
Microsoft .NET Framework 4.0: Data Integration with VB 2010
Microsoft .NET Framework 4.0: Web Application Optimization and Customization with VB 2010
Microsoft .NET Framework 4.0: Web Applications with Visual Studio 2010 and Visual Basic 2010
Microsoft .NET Framework 4.0: Web Form Controls with VB 2010
Microsoft .NET Framework 4: ASP.NET MVC 2 with C# 2010
Microsoft .NET Framework 4: Client-Side Scripting and AJAX with C# 2010
Microsoft .NET Framework 4: Configuring and Deploying Web Applications with C# 2010
Microsoft .NET Framework 4: Data Integration with C# 2010
Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with C# 2010
Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with VB 2010
Microsoft .NET Framework 4: Web Application Optimization and Customization with C# 2010
Microsoft .NET Framework 4: Web Applications with Visual Studio 2010 and Visual C# 2010
Microsoft SQL Server 2012: Creating Database Objects
Microsoft SQL Server 2012: Creating Functions and Triggers
Microsoft SQL Server 2012: Creating Programming Objects and Optimizing Queries
Microsoft SQL Server 2012: Managing XML Data
Microsoft SQL Server 2012: Manipulate Data Using Operators and Functions
Microsoft SQL Server 2012: Querying Basics and Modifying Data
Microsoft Windows 7: First Look for IT Professionals
Microsoft Windows Server 2008 R2 Hyper-V: Deploying VMs Using Templates
Microsoft Windows Server 2008 R2 Hyper-V: High Availability and Recoverability
Microsoft Windows Server 2008 R2 Hyper-V: Implementing Remote Desktop Services
Microsoft Windows Server 2008 R2 Hyper-V: Installing Hyper-V
Microsoft Windows Server 2008 R2 Hyper-V: Introduction and Planning Overview
Microsoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V Server
Microsoft Windows Server 2008 R2 Hyper-V: Migration, Creation, and Management
Microsoft Windows Server 2008 R2 Hyper-V: Monitoring and Managing Environments
Microsoft Windows Server 2008 R2 Hyper-V: Networking and Remote Administration
Microsoft Windows Server 2008 R2 Hyper-V: Remote Desktop Virtualization Roles
Microsoft.NET Framework 4: Web Form Controls with C# 2010
Migrating Infrastructure to the Cloud
Mobile IP
Monitoring and Controlling Project Scope (PMBOK® Guide Fifth Edition)
Monitoring and Managing the Data Center
Monitoring, Backing Up, and Restoring Windows 7 Systems
Monitoring, Backups, and Recovery in Windows Server 2008
Mounting and Managing File Systems
Moving Business Services into the Cloud
Network Protocols, Attacks, and Defenses
Network Storage Systems
Network and System Security Mechanisms
Networking Fundamentals in Linux
Networking Services in Linux
Non-Cellular Wireless Technology
Object-oriented Coding Best Practices
Oracle Database 11g Release 2: Backup and Recovery
Oracle Database 11g Release 2: Database Architecture and Installation
Oracle Database 11g Release 2: Database Architecture and Recovery Operations
Oracle Database 11g Release 2: Database Creation and Instance Management
Oracle Database 11g Release 2: Database Diagnostics and Flashback Technologies
Oracle Database 11g Release 2: Managing Concurrency, Undo, and Auditing
Oracle Database 11g Release 2: Managing Database Maintenance and Performance
Oracle Database 11g Release 2: Managing Database Memory and Performance
Oracle Database 11g Release 2: Managing Database Resources and the Scheduler
Oracle Database 11g Release 2: Managing Database Space and Duplication
Oracle Database 11g Release 2: Moving Data and Oracle Support
Oracle Database 11g Release 2: Performing Restore and Recovery Tasks
Oracle Database 11g Release 2: Storage Structures and User Security
Oracle Database 11g Release 2: The ASM Instance and Network Connectivity
Oracle Database 11g Release 2: The RMAN Catalog and Creating Backups
Oracle Database 11g Release 2: Using, Monitoring and Tuning RMAN
Oracle Database 11g: Basic User and Strong Authentication
Oracle Database 11g: Controlling User Access and Managing Schema Objects
Oracle Database 11g: Conversion Functions, Group Functions, and Joins
Oracle Database 11g: Data Dictionary Views and Large Data Sets
Oracle Database 11g: Database Auditing
Oracle Database 11g: Database Security
Oracle Database 11g: Encryption Concepts
Oracle Database 11g: Enterprise User Security and Proxy Authentication
Oracle Database 11g: Firewalls, Oracle Connection Manager, and SQL*Plus Security
Oracle Database 11g: Getting Started With PL/SQL
Oracle Database 11g: Introduction to Database Security and Solutions
Oracle Database 11g: Managing Data in Different Time Zones
Oracle Database 11g: Managing PL/SQL Code and Dependencies
Oracle Database 11g: Oracle Label Security and the Data Masking Pack
Oracle Database 11g: Oracle Net Services and Listener Security
Oracle Database 11g: PL/SQL Code and Dependency Management
Oracle Database 11g: PL/SQL Variables, Attributes, and Executable Statements
Oracle Database 11g: Packages, Dynamic SQL, and Coding Considerations
Oracle Database 11g: Packages, Dynamic SQL, and Coding Considerations in PL/SQL
Oracle Database 11g: Privileges, Roles, and Application Contexts
Oracle Database 11g: Subprograms, Packages, and Exception Handling
Oracle Database 11g: Subprograms, Packages, and Exception Handling in PL/SQL
Oracle Database 11g: Subqueries, Set Operators, and Data Manipulation
Oracle Database 11g: Transparent Data Encryption
Oracle Database 11g: Using DDL, Views, Sequences, Indexes, and Synonyms
Oracle Database 11g: Using DML, DDL, Cursors, Loops, and Control Structures
Oracle Database 11g: Using DML, DDL, Cursors, Control Structures, and Loops
Oracle Database 11g: Using Data Types, INDEX BY Tables, and Cursors
Oracle Database 11g: Using Data Types, INDEX BY Tables, and Cursors in PL/SQL
Oracle Database 11g: Using Exceptions, Subprograms, JDeveloper, and REF Cursors
Oracle Database 11g: Using SQL to Query Your Database
Oracle Database 11g: Using Subqueries and Regular Expressions
Oracle Database 11g: Using Triggers and the PL/SQL Compiler
Oracle Database 11g: Using Triggers, the PL/SQL Compiler, and Managing Code
Oracle Database 11g: Virtual Private Database
Oracle Database 11g: Working with Exceptions, Subprograms, JDeveloper, and REF Cursors
PHP: An Introduction
PHP: An Introduction (Linux)
Partitions, File Systems, and Disk Quotas
Performing Risk Analysis (PMBOK® Guide Fifth Edition)
Perl Language Fundamentals
Physical Disks and RAID Arrays
Plan Quality Management (PMBOK® Guide Fifth Edition)
Plan and Manage Project Communications (PMBOK® Guide Fifth Edition)
Planning Project Costs (PMBOK® Guide Fifth Edition)
Planning Project Human Resources (PMBOK® Guide Fifth Edition)
Planning Project Procurement Management (PMBOK® Guide Fifth Edition)
Planning an Agile Software Development Project
Practical Examples of User-Centered Design
Printing in Linux
Programming Techniques and Strategies
Project Management Overview (PMBOK® Guide Fifth Edition)
Project Management Process Groups (PMBOK® Guide Fifth Edition)
Project Requirements and Defining Scope (PMBOK® Guide Fifth Edition)
Project Stakeholder Management (PMBOK® Guide Fifth Edition)
Providing Cloud Security
Quality Assurance and Quality Control (PMBOK® Guide Fifth Edition)
Querying XML Data with XPath and XQuery
Querying, Navigating, and Linking XML Data
Redirection Approaches and Process Control
Remote Access and Wireless Security
Replication and Business Continuity
Risk Management Planning (PMBOK® Guide Fifth Edition)
Risk Response and Control (PMBOK® Guide Fifth Edition)
SAP Business One – Introduction for End Users
SAP BusinessObjects: Business Intelligence
SAP BusinessObjects: Crystal Reports
SAP BusinessObjects: Dashboards and Analytics
SAP BusinessObjects: InfoView
SAP BusinessObjects: Overview
SAP BusinessObjects: Web Intelligence
SQL Server 2008 R2: Creating and Altering Partitions
SQL Server 2008 R2: Creating and Implementing Database Objects
SQL Server 2008 R2: Gathering Performance Data
SQL Server 2008 R2: Implementing Programming Objects
SQL Server 2008 R2: Messaging, Full-Text Search, Scripts, and Track Changes
SQL Server 2008 R2: Performing Advanced Query Techniques
SQL Server 2008 R2: Querying and Managing XML Data
SQL Server 2008 R2: Running Queries and Manipulating Data
Securing Applications, Virtualized Environments, and Cloud Computing
Securing Storage
Securing and Deploying WPF Applications with C# 2010
Securing and Deploying WPF Applications with Visual Basic 2010
Securing and Managing a WCF 4 Application with C# 2010
Securing the IT Environment
Security in a Linux Environment
Security in the Linux Environment
Six Sigma and Lean in the Organization
SkillSoft Books 24 X 7
SkillSoft Guided Tour
Software Program Control Flow Fundamentals
Software Test Management
Stabilizing and Deploying SharePoint 2010 Components
Starting to Program with Perl
Static Techniques and Test Design in Software Testing
Storage Security
Storage System Architecture
Storage Technologies Update
Storage Virtualization
Storage Virtualization Technologies
Structuring XML with Schemas
Synchronizing Data and Managing ADO.NET 4 Applications with C# 2010
TestPrep Final Exam: ANSI C Programming
TestPrep Final Exam: C++ programming
Testing Throughout the Software Life Cycle
The Active Directory Infrastructure in Windows Server 2008
The Iterative Process in User-Centered Design
The Linux Kernel
Tool Support in Software Testing
Transforming and Formatting XML
UNIX Fundamentals: Files and Directories
UNIX Fundamentals: Network Administration
UNIX Fundamentals: Overview
UNIX Fundamentals: Security
UNIX Fundamentals: Shell Scripting Basics
Updating ADO.NET DataSets with C# 2010
Using LINQ and XML with ADO.NET 4 and C# 2010
Using the Linux Shell
VMware Datacenter Overview
VMware Desktop Overview
VMware Server Overview
VMware Workstation 7: Getting started with Virtual Machines
VMware Workstation 7: Managing Virtual Machines
Viewing and Navigating Data with ADO.NET 4 DataSets Using C# 2010
Virtualization with VMware: An Overview
WCF 4 Contracts, Behaviors, and Data Management Using C# 2010
Web Services and XML
White-Box Software Testing Techniques
Windows Application Development with Visual Basic 2010
Windows Applications Content Creation and Management with C# 2010
Windows Applications Content Creation and Management with Visual Basic 2010
Windows Applications Databinding with C# 2010
Windows Applications Databinding with Visual Basic 2010
Working with Forms, the Canvas, and Media in HTML5
Working with Sendmail and Apache
Working with the ADO.NET Entity Framework 4 Using C# 2010
Writing Shell Scripts in Linux
XML APIs
XML Language Basics
XML Transformation Using XSLT and XSL-FO
[/spoiler]

 

I think it’s a pretty great opportunity. How much does it cost ?
It costs $42/year for all countries but the less developed countries for which the subscription cost is lower ($32 – Romania).
List of less developed countries.

Subscribe NOW and make use of the largest and most respected community of Students and IT Professionals around the word.
Website: www.acm.org

Simple Share Buttons