Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a...
Accounting Best Practices (Wiley Best Practices)
Accounting Best Practices (Wiley Best Practices)

A revised and updated Second Edition of the guide that lets you turn your adequate practices into Best Practices

Accounting Best Practices provides you with the most advanced techniques and strategies available today to help your business cut costs and improve accounting operations–regardless of your company’s size or...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Statistics in a Nutshell: A Desktop Quick Reference
Statistics in a Nutshell: A Desktop Quick Reference
One thing I (Sarah) have learned over the last 20 or so years is that a sure way to derail a promising conversation at a party is to tell people what I do for a living. And rest assured that I’m neither a tax auditor nor captain of a sludge barge.No, I’m merely a biostatistician and statistics instructor, a revelation which invariably...
CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast
Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast

Zimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy...

Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
Business Process Mapping: Improving Customer Satisfaction
Business Process Mapping: Improving Customer Satisfaction
Praise For Business Process Mapping: Improving Customer Satisfaction, Second Edition

"A must-read for anyone performing business process mapping! This treasure shares step-by-stepapproaches and critical success factors, based on years of practical, customer-focused experience.A real winner!"
в
...

Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy