|
|
|
|
CISA Certified Information Systems Auditor Study Guide
The industry-leading study guide for the CISA exam, fully updated
More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated... | | | | Extreme Productivity: Boost Your Results, Reduce Your Hours
“Required reading for professionals—and aspiring professionals—of all levels.”
—Shirley Ann Jackson, President of Rensselaer Polytechnic Institute and Former Chairman of U.S. Nuclear Regulatory Commission
“Read this book if you want to learn how to run efficient and effective... |
|
Practical RF System DesignThe ultimate practical resource for today’s RF system design professionals
Radio frequency components and circuits form the backbone of today’s mobile and satellite communications networks. Consequently, both practicing and aspiring industry professionals need to be able to solve ever more complex problems of RF design. ... | | Photoshop CS3 Essential Skills (Photography Essential Skills)
Brimming with beautiful pictures, this successful book guides you through a project-based, progressive curriculum so that you can build all the essential skills to enhance photographs creatively and professionally with Photoshop CS3. If you are an aspiring professional, enthusiastic amateur photographer, or a student learning photography,... | | Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman... |
|
Communicating Science: A Practical Guide for Engineers and Physical Scientists
Read this book before you write your thesis or journal paper! Communicating Science is a textbook and reference on scientific writing oriented primarily at researchers in the physical sciences and engineering. It is written from the perspective of an experienced researcher. It draws on the authors' experience of teaching and working with... | | Asian Founders at Work: Stories from the Region’s Top Technopreneurs
What does it take to successfully launch and scale a startup in Asia? While much of modern business literature covers Silicon Valley and its founders, building a company in Asia?a world center of technology and innovation?is a vastly different journey, and not nearly as widely covered. This book aims to change that.
... | | Software Testing
Software Testing is the book for new or aspiring software testers interested in learning about this crucial part of the software development process. The complexity and size of today's software makes writing bug-free code extremely difficult, even for highly experienced programmers. Couple that with our increasing reliance on software for... |
|
Compilers: Principles, Techniques, & Tools with Gradiance (pkg) (2nd Edition)
In the time since the 1986 edition of this book, the world of compiler design
has changed significantly. Programming languages have evolved to present new
compilation problems. Computer architectures offer a variety of resources of
which the compiler designer must take advantage. Perhaps most interestingly,
the venerable... | | How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO
In just under a decade, Facebook has gone from a Harvard prodigy's dorm-room experiment to an essential part of the social life of hundreds of millions of children, teens, and adults across the globe. It's no surprise, then, that the company has been the subject of countless magazine articles, books, and even movies. But despite the... | | Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |