 |
|
 Information Protection Playbook (Risk Management Portfolio)
The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business... |  |  Small Business Smarts: Building Buzz with Social Media
Social networking plus small business is a slam dunk! Small Business Smarts: Building Buzz with Social Media explains why that's so and helps small business owners decide whether social media tools are right for them. Assuming the answer is yes, the book offers concrete advice and implementation suggestions that make using tools to... |  |  Kali Linux Social Engineering
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux
Overview
-
Learn about various attacks and tips and tricks to avoid them
-
Get a grip on efficient ways to perform penetration testing.
-
Use advanced techniques to bypass...
|
|
 Tax Insight: For Tax Year 2013 and Beyond
Tax Insight: For Tax Year 2013 and Beyond will teach you to take control of life’s biggest expense—taxes. In your lifetime, you will spend more money on taxes than on anything else. Despite that fact, you likely know the current prices of movies and milk but don’t know what your marginal tax rate is. You know where... |  |  Tax Insight: For Tax Year 2014 and Beyond
Tax Insight: For Tax Year 2014 and Beyond will teach you to take control of life’s biggest expense—taxes.
In your lifetime, you will spend more money on taxes than on anything else. Despite that fact, you likely know the current prices of movies and milk but don’t know what your marginal tax rate is. You... |  |  Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the... |
|
|
|
| Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |