The SSCP Prep Guide: Mastering the Seven Key Areas of System Security A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination
This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...
OpenAM is an open source continuation of the OpenSSO project that was taken over, and later scrapped, by Oracle. OpenAM is the only commercial-grade, feature-rich web application that provides SSO solutions. It has a variety of features and a powerful Single Sign-On (SSO) capability, but the implementation can be tricky, and the unorganized...
Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
Extending Symfony 2 Web Application Framework
Optimize, audit, and customize web applications with Symfony
About This Book
Extend the main elements of Symfony 2
Learn about the internal Symfony 2 framework
Customize developed web applications with Symfony 2
Who This Book Is For
Lean Auditing: Driving Added Value and Efficiency in Internal Audit
"How can you argue with the core principles of Lean, that you focuson what provides value to your customer and eliminate work that isnot necessary (muda)? Internal auditors need to understandnot only who their primary customers are, but what isvaluable to them - which in most cases is assurance that the risksthat matter to the...
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
Computer Forensics with FTK
Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.
About This Book
Receive step-by-step guidance on conducting computer...
PowerShell Deep Dives
Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...
|Result Page: 14 13 12 11 10 9 8 7 6 5 |