Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Power Plant Engineering
Power Plant Engineering

There have been significant developments and advances in the field of power plant engineering, computer applications on energy audit and management, environmental audit and management, human development and environment. The authors have been encouraged to write this pioneer book for the benefit of students of engineering and researchers due...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators

The First Practical Guide to the Use of Photoshop in Forensics Investigations

This timely book is the first to take the forensic use of digital imaging out of the classroom and into the real world for law enforcement, legal, and other forensics professionals. How do you show the exact position or...

Nonprofit Bookkeeping & Accounting For Dummies (Wiley Finance)
Nonprofit Bookkeeping & Accounting For Dummies (Wiley Finance)
Counting the money in your wallet or purse is an act of accounting. If you ever make a note of how much you have, you’re even performing a bookkeeping function. You count things all the time in everyday life without thinking twice about accounting. For example, you count the plates before setting the table at home. You count the number of...
The BRC Global Standard for Food Safety: A Guide to a Successful Audit
The BRC Global Standard for Food Safety: A Guide to a Successful Audit

This book will offer companies in the food industry a comprehensive guide to preparing for a British Retail Consortium Standard evaluation (Issue 6). It will enable them to ensure that the correct systems are in place to achieve the Standard, and also that they present themselves in the best possible light during the audit process. It will...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy