Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)
The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)

The Wiley Handbook of Global Educational Reform examines educational reform from a global perspective. Comprised of approximately 25 original and specially commissioned essays, which together interrogate educational reform from a critical global and transnational perspective, this volume explores a range of topics and themes...

Auditor Essentials (Internal Audit and IT Audit)
Auditor Essentials (Internal Audit and IT Audit)

Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession. This easy to use reference makes this process easier and ensures auditors can obtain needed information quickly and accurately. This book consists of 100...

Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Protecting Oracle Database 12c
Protecting Oracle Database 12c

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation...

CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)

CD FEATURES More Than 200 PRACTICE QUESTIONS

 

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for...

Essential Excel 2016: A Step-by-Step Guide
Essential Excel 2016: A Step-by-Step Guide
This book shows you how easy it is to create, edit, sort, analyze, summarize and format data as well as graph it. Loaded with screen shots, step-by-step instructions, and reader exercises, Essential Excel 2016 makes it easy for you to get to grips with this powerful software and what it can do.


Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Power Plant Engineering
Power Plant Engineering

There have been significant developments and advances in the field of power plant engineering, computer applications on energy audit and management, environmental audit and management, human development and environment. The authors have been encouraged to write this pioneer book for the benefit of students of engineering and researchers due...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy