Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics

Key Features

  • This easy-to-follow guide takes you through every step of the data wrangling process in the best possible way
  • Work with different types of datasets, and reshape the layout of your data to make it easier for analysis
  • Get simple examples and real-life data...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Essential Excel 2016: A Step-by-Step Guide
Essential Excel 2016: A Step-by-Step Guide
This book shows you how easy it is to create, edit, sort, analyze, summarize and format data as well as graph it. Loaded with screen shots, step-by-step instructions, and reader exercises, Essential Excel 2016 makes it easy for you to get to grips with this powerful software and what it can do.


Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

The Audit Committee Handbook
The Audit Committee Handbook

The Audit Committee Handbook,

Fifth Edition

The classic handbook to audit committee responsibilities—completely updated to cover the latest guidance with practical insights on the new functions of the audit committee.

Now containing the newest regulatory guidance impacting audit committees, including new...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy