Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Network Security Bible
Network Security Bible
If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how
...
Afghanistan: A History from 1260 to the Present
Afghanistan: A History from 1260 to the Present
Located at the intersection of Asia and the Middle East, Afghanistan has been strategically important for thousands of years. Its ancient routes and strategic position between India, Inner Asia, China, Persia, and beyond has meant the region has been subject to frequent invasions, both peaceful and military. As a result, modern...
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Auditing Information Systems
Auditing Information Systems

Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly...

Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)
Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)

The book showcases examples of university engagement in community initiatives and reports on the results from research and from a variety of institutional projects and programmes. As a whole, the book illustrates how actors at the community (microlevel) and other levels (meso and macro) can make valuable and concrete contributions to...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth
You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth

Janine Driver was trained as a lie detection expert for the ATF, FBI, and the CIA and is a New York Times bestselling author (You Say More Than You Think). Now she makes a powerful and incontrovertible declaration: You Can’t Lie to Me.  Driver—who is known in professional circles as “the...

Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (Penguin Books)
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (Penguin Books)
Winner of the 2005 Pulitzer Prize

The explosive first-hand account of America's secret history in Afghanistan


With the publication of Ghost Wars, Steve Coll became not only a Pulitzer Prize winner, but also the expert on the rise of the Taliban, the emergence of Bin Laden, and the secret
...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy