Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
WRITTEN BY A LAW ENFORCEMENT PROFESSIONAL FOR OTHER LAW ENFORCEMENT PERSONNEL IN THE TRENCHES This book examines the workings of organized criminals and criminal groups that transcend national boundaries. Discussions include methods used by criminal groups to internationally launder money; law enforcement efforts to counteract such schemes; and...
Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

Pro SharePoint 2010 Governance (Professional Apress)
Pro SharePoint 2010 Governance (Professional Apress)

Governance is the process of creating policies and rules and assigning roles and responsibilities to make a system work properly. Even if your attitude is “Good Government is Less Government,” very few of us

would want to have no government. In short, governance is the difference between order and chaos.

...
Oracle Essentials: Oracle Database 12c
Oracle Essentials: Oracle Database 12c

Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracle’s product line, including its...

The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight
The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight

Architecture for the Intelligent Enterprise: Powerful New Ways to Maximize the Real-time Value of Information

 

Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more...

Manager's Guide to Compliance
Manager's Guide to Compliance
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX."
—Rob Nance, Publisher, AccountingWEB, Inc.

"Robust compliance and corporate governance is an absolute necessity...

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
Water Technology, Second Edition: An Introduction for Environmental Scientists and Engineers
Water Technology, Second Edition: An Introduction for Environmental Scientists and Engineers

Water and wastewater engineering is the worlds biggest industry with more professionals working in it than in any other single industry sector. This accessible student textbook introduces the reader to the key concepts of water technology by explaining the fundamentals of hydrobiology, aquatic ecosystems, water treatment and supply and...

Collaborative Design Management
Collaborative Design Management

The design process has always been central to construction, but recent years have seen its significance increase, and the ways of approaching it multiply. To an increasing degree, other stakeholders such as contractors have input at the design stage, and the designer’s role includes tasks that were traditionally...

Electromagnetic Compatibility Engineering
Electromagnetic Compatibility Engineering
Praise for Noise Reduction Techniques IN electronic systems

"Henry Ott has literally 'written the book' on the subject of EMC. . . . He not only knows the subject, but has the rare ability to communicate that knowledge to others."
—EE Times

Electromagnetic Compatibility Engineering is a...

Aligning Business and IT with Metadata: The Financial Services Way
Aligning Business and IT with Metadata: The Financial Services Way

"An invaluable resource that I recommend to anyone in the financial services industry."
Dirk Riehle, Senior Research Scientist, SAP Labs LLC

"Risk officers, compliance officers, information/IT officers and CFOs coping with financial, risk, regulatory, and data management...

Building Applications with the Linux Standard Base
Building Applications with the Linux Standard Base

An initiative of the Free Standards Group, the Linux Standard Base (LSB) is a set of standards designed to increase compatibility among Linux distributions and enable applications to run on any LSB-compliant system. The advent of LSB 2.0 is revolutionary in that it allows ISVs to create “shrink-wrapped software” for the Linux...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy