Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Tax Insight: For Tax Year 2013 and Beyond
Tax Insight: For Tax Year 2013 and Beyond

Tax Insight: For Tax Year 2013 and Beyond will teach you to take control of life’s biggest expense—taxes. In your lifetime, you will spend more money on taxes than on anything else. Despite that fact, you likely know the current prices of movies and milk but don’t know what your marginal tax rate is. You know where...

Auditor Essentials (Internal Audit and IT Audit)
Auditor Essentials (Internal Audit and IT Audit)

Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession. This easy to use reference makes this process easier and ensures auditors can obtain needed information quickly and accurately. This book consists of 100...

Vitreoretinal Surgery
Vitreoretinal Surgery

This lavishly illustrated book covers the most common diseases, exploring appropriate approaches to a range of vitreoretinal problems. All common vitreoretinal procedures are explained step by step with diagrams and color photos. Finally, the book provides a basic electronic patient record system, which corresponds to the subject...

The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The first commercially available book to offer CISA study material

The CISA certification is a prerequisite for many audit and security job postings in the marketplace today. Becom-ing certified takes years of experience and exposure to information systems and risk and control techniques. In this book, John Kramer refers to his own experiences...

Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption is written for members of boards of directors and audit committees, senior executives, those who advise or report to them, and those responsible for managing fraud and corruption risks. It describes in plain English terms a proactive fraud and corruption risk...
The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)
The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)

The Wiley Handbook of Global Educational Reform examines educational reform from a global perspective. Comprised of approximately 25 original and specially commissioned essays, which together interrogate educational reform from a critical global and transnational perspective, this volume explores a range of topics and themes...

OpenAM
OpenAM

OpenAM is an open source continuation of the OpenSSO project that was taken over, and later scrapped, by Oracle. OpenAM is the only commercial-grade, feature-rich web application that provides SSO solutions. It has a variety of features and a powerful Single Sign-On (SSO) capability, but the implementation can be tricky, and the unorganized...

CISA Certified Information Systems Auditor All-in-One Exam Guide
CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...

Windows NT User Administration
Windows NT User Administration

Windows NT User Administration covers everyday problems faced by system administrators and goes beyond the GUI to describe the tools you need to solve them. The book covers the whole spectrum of user management: user security, user customization, and system resource auditing. You'll find real-world examples and many useful Perl...

Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy