Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Case Studies In Knowledge Management
Case Studies In Knowledge Management
Knowledge Management (KM) has been growing in importance and popularity
as a research topic since the mid 1990s. This is sufficient time for many organizations
to implement KM initiatives and KM systems (KMS). This book presents twenty cases
investigating the implementation of KM in a number of business and industry settings
and
...
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation deals with enterprise resource planning (ERP) systems implementation, and also business operations/processes and information systems to support business operations/processes. There are a large number of books treating ERP implementation, operations management and information systems...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Geographic Information Systems in Business
Geographic Information Systems in Business
This book contains state-of-the-art research studies on the concepts, theory, processes, and real world applications of geographical information systems (GIS) in business. Its chapters are authored by many of the leading experts in applying GIS and geospatial science to business. The book utilizes a wide variety of approaches and methodologies...
Handbook on Decision Support Systems 1: Basic Themes (International Handbooks on Information Systems)
Handbook on Decision Support Systems 1: Basic Themes (International Handbooks on Information Systems)
Decision support systems comprise a core subject area of the information systems (IS) discipline, being one of several major expansions that have occurred in the IS field. The decision support system (DSS) area, as a subject of research and practice, continues to grow along ever-widening horizons – often blending with other...
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
In the information technology age coupled with computer advances, information systems have become an integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agriculture, and even traf.c lights have one thing in common called...
Handbook on Decision Support Systems 2: Variations (International Handbooks on Information Systems)
Handbook on Decision Support Systems 2: Variations (International Handbooks on Information Systems)

As the most comprehensive reference work dealing with decision support systems (DSS), this book is essential for the library of every DSS practitioner, researcher, and educator. Written by an international array of DSS luminaries, it contains more than 70 chapters that approach decision support systems from a wide variety of perspectives....

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Supporting Real Time Decision-Making: The Role of Context in Decision Support on the Move
Supporting Real Time Decision-Making: The Role of Context in Decision Support on the Move

This volume of Annals of Information Systems will acknowledge the twentieth anniversary of the founding of the International Society for Decision Support Systems (ISDSS) by documenting some of the current best practices in teaching and research and envisioning the next twenty years in the decision support systems field. The volume is intended...

Result Page: 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy