 |
|
 Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just... |  |  Fiber Reinforced Polymer (FRP) Composites for Infrastructure Applications
This book was made possible by the exceptional support provided by the US Army
Engineer Research and Development Center (ERDC), Construction Engineering
Research Laboratory (CERL), and University of the Pacific School of Engineering
and Computer Science.
The authors, as listed in this book, took the time to prepare... |  |  Test Equating, Scaling, and Linking: Methods and Practices
This book provides an introduction to test equating, scaling and linking, including those concepts and practical issues that are critical for developers and all other testing professionals. In addition to statistical procedures, successful equating, scaling and linking involves many aspects of testing, including procedures to develop tests,... |
|
|
 Communicating Science: A Practical Guide for Engineers and Physical Scientists
Read this book before you write your thesis or journal paper! Communicating Science is a textbook and reference on scientific writing oriented primarily at researchers in the physical sciences and engineering. It is written from the perspective of an experienced researcher. It draws on the authors' experience of teaching and working with... |  |  SharePoint Server 2010 Enterprise Content Management
SharePoint experts focus on SharePoint 2010 as a platform for Enterprise Content Management
SharePoint allows all users in an organization to manage and share their content reliably and securely. If you're interested in building Web sites using the new capabilities of enterprise content management (ECM) in SharePoint 2010, then... |  |  Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically... |
|
 A Practical Introduction to Enterprise Network and Security Management
Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful... |  |  Automating Microsoft Azure with Powershell
Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments
About This Book
-
Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
- ...
|  |  Governance, Risk, and Compliance Handbook for Oracle Applications
-
Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
-
Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
... |
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |