Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Governance (Wiley Series in Systems Engineering and Management)

Buy
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive book.
(HTML tags aren't allowed.)

PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond
PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond

Harness the power of PolyBase data virtualization software to make data from a variety of sources easily accessible through SQL queries while using the T-SQL skills you already know and have mastered.

PolyBase Revealed shows you how to use the PolyBase feature of SQL Server 2019 to...

Practical DataOps: Delivering Agile Data Science at Scale
Practical DataOps: Delivering Agile Data Science at Scale
Gain a practical introduction to DataOps, a new discipline for delivering data science at scale inspired by practices at companies such as Facebook, Uber, LinkedIn, Twitter, and eBay. Organizations need more than the latest AI algorithms, hottest tools, and best people to turn data into insight-driven action and useful...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...


Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy