Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Adobe Photoshop Forensics
Adobe Photoshop Forensics
Thanks to TV's crime scene investigation shows, forensic technology has entered popular culture. Combining puzzle solving and a dramatic storyline, these shows fascinate audiences as high-tech procedures uncover the truths hidden in seemingly insignificant clues. What many people may not realize is that forensic teams also use items they probably...
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Discover how to detect fraud, biases, or errors in your data using Access or Excel

With over 300 images, Forensic Analytics reviews and shows how twenty substantive and rigorous tests can be used to detect fraud, errors, estimates, or biases in your data. For each test, the original data is shown with the steps needed to get to the...

Computer Security Handbook, Set
Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...

Introductory Statistics, Third Edition
Introductory Statistics, Third Edition

In this 3rd edition revised text, master expositor Sheldon Ross has produced a unique work in introductory statistics. The text's main merits are the clarity of presentation, contemporary examples and applications from diverse areas, and an explanation of intuition and ideas behind the statistical methods. Concepts are motivated,...

Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
This book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely...
eBay® QuickSteps, 2nd Edition
eBay® QuickSteps, 2nd Edition
Step-by-Step, Full-Color Graphics!

Get started using eBay right away-the QuickSteps way. Color screenshots and clear instructions show you how to buy and sell just about anything. You'll learn to navigate eBay, become a member, and develop strategies for buying at the lowest prices. You'll also find out how to list your items...

Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud
Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud

A recent CBS poll revealed that, as a result of corporate scandals at Enron, WorldCom, Adelphia Communications, and others, a whopping two-thirds of Americans believe that corporate executives are dishonest. This overall assessment is even worse now than during the last financial crises, the savings and loan debacle of the 1980s....

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Sarbanes-Oxley and the Board of Directors : Techniques and Best Practices for Corporate Governance
Sarbanes-Oxley and the Board of Directors : Techniques and Best Practices for Corporate Governance
If you're a sitting or prospective board member of a corporation, how can you ensure that you and other directors are in compliance with Sarbanes-Oxley and other regulatory requirements? How can you maximize your contribution to the board and the company, and minimize your risk as a board member?

Serving on the board of directors of a company...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy