Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...
Digital Accounting: The Effects of the Internet And Erp on Accounting Digital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a... Accounting Best Practices (Wiley Best Practices)
A revised and updated Second Edition of the guide that lets you turn your adequate practices into Best Practices
Accounting Best Practices provides you with the most advanced techniques and strategies available today to help your business cut costs and improve accounting operations–regardless of your company’s size or...
Wireless Security Handbook This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this...
Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast
Zimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy...
Penetration Tester's Open Source Toolkit, Volume 2 Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... Business Process Mapping: Improving Customer Satisfaction Praise For Business Process Mapping: Improving Customer Satisfaction, Second Edition
"A must-read for anyone performing business process mapping! This treasure shares step-by-stepapproaches and critical success factors, based on years of practical, customer-focused experience.A real winner!"
|Result Page: 5 4 3 2 1 |