Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?

Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...

Tax Strategies for the Small Business Owner: Reduce Your Taxes and Fatten Your Profits
Tax Strategies for the Small Business Owner: Reduce Your Taxes and Fatten Your Profits

Tax Strategies for the Small Business Owner: Reduce Your Taxes and Fatten Your Profits  will help the small business owner increase profits while feeling more comfortable dealing with taxes. It begins by looking at the often overlooked critical decision small business owners face when they start a business: the choice of...

Obstetrics and Gynaecology (Lecture Notes)
Obstetrics and Gynaecology (Lecture Notes)

"Lecture Notes: Obstetrics and Gynaecology" provides a concise introduction to obstetrics and gynaecology for medical students and junior doctors. Six sections examine the female development from the early years to old age. The text starts with a section on Basic Science. Self-assessment questions are found throughout the text to...

Next Generation Red Teaming
Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s...

Vitreoretinal Surgery
Vitreoretinal Surgery

This lavishly illustrated book covers the most common diseases, exploring appropriate approaches to a range of vitreoretinal problems. All common vitreoretinal procedures are explained step by step with diagrams and color photos. Finally, the book provides a basic electronic patient record system, which corresponds to the subject...

Extending Symfony 2 Web Application Framework
Extending Symfony 2 Web Application Framework

Optimize, audit, and customize web applications with Symfony

About This Book

  • Extend the main elements of Symfony 2
  • Learn about the internal Symfony 2 framework
  • Customize developed web applications with Symfony 2

Who This Book Is For

If you...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

Learning Puppet Security
Learning Puppet Security

Secure your IT environments with the powerful security tools of Puppet

About This Book

  • Pass a compliance audit by showing the concrete state of your systems using Puppet
  • Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
Auditing: A Risk-Based Approach to Conducting a Quality Audit (with ACL CD-ROM)
Auditing: A Risk-Based Approach to Conducting a Quality Audit (with ACL CD-ROM)

Prepare yourself for the dramatic changes in today's auditing environment by using Johnstone/Gramling/Rittenberg's AUDITING: A RISK-BASED APPROACH TO CONDUCTING QUALITY AUDITS, 9th EDITION. This newest edition reflects the clarified auditing standards and the newest PCAOB standards, discusses COSO's updated Internal...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy