 |
|
|
 Accounting Information Systems
The sixth edition of ACCOUNTING INFORMATION SYSTEMS provides thorough and up-to-date coverage of accounting information systems and related technologies. It features an early presentation of transaction cycles, as well as an emphasis on ethics, fraud, and the modern manufacturing environment. The book focuses on the needs and responsibilities... |  |  Computer Security Handbook, Set
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer... |  |  Poor Relief in England, 1350-1600
Between the mid fourteenth century and the Poor Laws of 1598 and 1601, English poor relief moved toward a more coherent and comprehensive network of support. Marjorie McIntosh's study, the first to trace developments across that time span, focuses on three types of assistance: licensed begging and the solicitation of charitable alms;... |
|
 Predictive Analytics For Dummies
Combine business sense, statistics, and computers in a new and intuitive way, thanks to Big Data Predictive analytics is a branch of data mining that helps predict probabilities and trends. Predictive Analytics For Dummies explores the power of predictive analytics and how you can use it to make valuable predictions for your business, or in... |  |  Identity Theft For Dummies
Practical solutions to help you deter, detect, and defend against identity theft In 2008, 9.9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spend some $5 billion out-of-pocket each year to clear up resulting fraud issues. This guide will help keep you from becoming the next victim.... |  |  Computer Crime: A Crimefighter's Handbook (Computer Security)
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |