Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Sarbanes-Oxley and the Board of Directors : Techniques and Best Practices for Corporate Governance
Sarbanes-Oxley and the Board of Directors : Techniques and Best Practices for Corporate Governance
If you're a sitting or prospective board member of a corporation, how can you ensure that you and other directors are in compliance with Sarbanes-Oxley and other regulatory requirements? How can you maximize your contribution to the board and the company, and minimize your risk as a board member?

Serving on the board of directors of a company...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Internal Audit: Efficiency Through Automation
Internal Audit: Efficiency Through Automation
Internal Audit

Efficiency through Automation

Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly...

Warranty Fraud Management: Reducing Fraud and Other Excess Costs in Warranty and Service Operations (Wiley and SAS Business Series)
Warranty Fraud Management: Reducing Fraud and Other Excess Costs in Warranty and Service Operations (Wiley and SAS Business Series)

Cut warranty costs by reducing fraud with transparent processes and balanced control

Warranty Fraud Management provides a clear, practical framework for reducing fraudulent warranty claims and other excess costs in warranty and service operations. Packed with actionable guidelines and detailed information, this book...

Manager's Guide to Compliance
Manager's Guide to Compliance
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX."
—Rob Nance, Publisher, AccountingWEB, Inc.

"Robust compliance and corporate governance is an absolute necessity...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Advances in K-means Clustering: A Data Mining Thinking (Springer Theses: Recognizing Outstanding Ph.D. Research)
Advances in K-means Clustering: A Data Mining Thinking (Springer Theses: Recognizing Outstanding Ph.D. Research)
The series ‘‘Springer Theses’’ brings together a selection of the very best Ph.D. theses from around the world and across the physical sciences. Nominated and endorsed by two recognized specialists, each published volume has been selected for its scientific excellence and the high impact of its contents for...
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...

From Good to Bad Bankers: Lessons Learned from a 50-Year Career in Banking
From Good to Bad Bankers: Lessons Learned from a 50-Year Career in Banking

Bankers are administrators of other people’s money, and they are responsible both to their depositors and to other stakeholders.  Human nature being what it is, however, they sometimes fall prey to overweening ambition, coming to see themselves as the rightful beneficiaries of the moneys entrusted to them.  This can...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy