Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a...
Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Enhanced Occupational Outlook Handbook
Enhanced Occupational Outlook Handbook
This book presents reliable and useful information about occupations in a way not available in the past. Its concept is simple: It allows you to identify major jobs of interest and then read details about those jobs and the many more-specialized jobs related to them.

This edition of the Enhanced
...
Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

ISO 9001:2015 for Everyday Operations: All Facts – Short, Concise and Understandable (essentials)
ISO 9001:2015 for Everyday Operations: All Facts – Short, Concise and Understandable (essentials)

Martin Hinsch summarizes all chapters of the ISO 9001:2015 shortly. The text offers both beginners and users with little knowledge of the standard an introduction to or a refresher course on the world's most important standard for management systems. Therefore, each individual chapter of the standard is described. The text is...

CISA Exam Prep: Certified Information Systems Auditor (ACM Press)
CISA Exam Prep: Certified Information Systems Auditor (ACM Press)
The CISA Exam Prep provides you with the market's most comprehensive and current material for passing the new CISA certification exam. Exam Prep's best-selling study methods feature chapter review questions, practice exams, exam alerts, notes, tips, and cautions. You'll also have exclusive access to online test...
Leading High-Performance Projects
Leading High-Performance Projects
This book explains how project managers can adopt the most appropriate leadership styles, encourage greater teaming, become more effective decision-makers, reduce incidences of negative conflict, and eliminate "negative energy."

According to studies by major think tanks, few projects finish on time, within budget, or meet...

Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design and Implementation focuses on some semantic aspects which have not been studied in previous works and extends the EER model with fuzzy capabilities. The exposed model is called FuzzyEER model, and some of the studied extensions are: fuzzy attributes, fuzzy aggregations and different aspects on specializations, such...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Dictionary of Landscape Architecture and Construction
Dictionary of Landscape Architecture and Construction
In an industry that involves the skills, expertise, and labor of a wide-range of professionals and workers, good communications become crucial, and a common vocabulary is key to successful projects. Many of the terms used in landscape architecture, land planning, environmental planning, and landscape construction are unavailable, or so new, or...
CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

Take charge of your career with CISA certification

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS...

unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy