Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Privacy Protection for E-Services
Privacy Protection for E-Services
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material,...
Vault Guide to Finance Interviews, 6th Edition
Vault Guide to Finance Interviews, 6th Edition
Money makes the world go round, and those in charge of money are the financiers. Have thirst for relevance? The finance industry has always been a competitive field, due in large part to the glamour and prestige assigned to the working relationships with industry titans. Of course, the outstanding salaries explain much of the pull as well. (Unless...
AdvancED Flex 3
AdvancED Flex 3
Whether you're a Flex 3 beginner or intermediate user, this book provides the necessary information to help you develop into an expert. Using a practical hands-on approach, it illustrates exactly how to create robust and scalable enterprise-grade Rich Internet Applications (RIAs).

The book is divided into three parts. The first part discusses...

Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Evolving Web services standards and technologies offer limited interoperability when it comes to security, management, and other important application characteristics. Successful interoperability solutions require comprehensive integration strategies that go beyond simple connections. The capability to mitigate security and reliability risks and...
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

The Atomic Corporation: Rational Proposals for Uncertain Times
The Atomic Corporation: Rational Proposals for Uncertain Times

In Atomic the authors' revolutionary theory is put to the test. Looking across all sectors of business, including retail banking, financial services, telecommunications, IT and consultancy, carbon-based corporations (oil and gas companies), and consumer products companies, Camrass and Farncombe discover some real eye-openers, including...

Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility

Never has ethical business conduct received as much attention and focus as it does at present, in the wake of the far-reaching financial and societal effects of the dramatic collapses that have thundered through Corporate America. Whether your company is private, publicly-held, works with the government – either contractually or through...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy