 |
|
|
|
 Accounting Best Practices (Wiley Best Practices)
A revised and updated Second Edition of the guide that lets you turn your adequate practices into Best Practices
Accounting Best Practices provides you with the most advanced techniques and strategies available today to help your business cut costs and improve accounting operations–regardless of your company’s size or... |  |  Essentials of Payroll: Management and AccountingESSENTIALS OF PAYROLL
Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise paperback will help you stay up to date on the newest thinking, strategies, developments, and technologies in payroll.
"Steven has done it again. Payroll... |  |  Auditor's Guide to Information Systems AuditingPraise for Auditor′s Guide to Information Systems Auditing
"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what... |
|
 Incident Response and Computer Forensics, Second EditionCompletely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in... |  |  Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to... |  |  Auditing Information SystemsAuditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly... |
|
Result Page: 3 2 1 |