Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wiley CPAexcel Exam Review 2015 Study Guide (January): Auditing and Attestation (Wiley Cpa Exam Review)
Wiley CPAexcel Exam Review 2015 Study Guide (January): Auditing and Attestation (Wiley Cpa Exam Review)

"I wanted to say I bought just the four books by Wiley for each CPA section and took all 4 parts of the exam in May 2009. I studied for about half a year, and I PASSED ALL 4 PARTS ON THE FIRST TRY!!! 95% REG, 88% FAR, 82% AUD, 81% BEC. I am very excited and happy that these books alone helped me pass!"
—Gabriela
...

The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Oracle Warehouse Builder 11g: Getting Started
Oracle Warehouse Builder 11g: Getting Started
Competing in today's world requires a greater emphasis on strategy, long-range planning, and decision making, and this is why businesses are building data warehouses. Data warehouses are becoming more and more common as businesses have realized the need to mine the information that is stored in electronic form. Data warehouses provide valuable...
SAS 9.2 Intelligence Platform: Security Administration Guide
SAS 9.2 Intelligence Platform: Security Administration Guide
Explains the security model for the SAS Intelligence Platform and provides instructions for performing security-related administrative tasks. The emphasis is on suite-wide aspects of the security functionality that SAS provides.

New and enhanced features in the following areas increase security and manageability:
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Oracle Security
Oracle Security
This book covers the field of Oracle security from simple to complex. It describes basic RDBMS security features (e.g., passwords, profiles, roles, privileges, synonyms) and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle...
Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design

The database has two important roles: 1. Serve the data—databases are commonly referred to as data servers; 2. Protect the data. Yes that’s right, the database is there to serve and protect. Database security features are vast and complex. While the complexity can afford us many ways to provide a robust...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
What do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just...
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Auditing After Sarbanes-Oxley
Auditing After Sarbanes-Oxley

This casebook is intended as a supplement to any primary auditing text, as it helps extend and focus classroom discussions on the impact of Sarbanes-Oxley. It grabs student interest by providing engaging, real-world examples of the auditing environment pre- and post-Sarbanes-Oxley.

...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy