Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Statement Fraud: Strategies for Detection and Investigation (Wiley Corporate F&A)
Financial Statement Fraud: Strategies for Detection and Investigation (Wiley Corporate F&A)

Valuable guidance for staying one step ahead of financial statement fraud

Financial statement fraud is one of the most costly types of fraud and can have a direct financial impact on businesses and individuals, as well as harm investor confidence in the markets. While publications exist on financial statement fraud and roles...

The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Advanced Techniques in Knowledge Discovery and Data Mining
Advanced Techniques in Knowledge Discovery and Data Mining
Data mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance...
Public Key Infrastructure and Implementation and Design
Public Key Infrastructure and Implementation and Design
Today we are in the midst of an electronic business revolution. The growth of the Internet and e−commerce has presented businesses with an opportunity to forge new links with customers and partners by transcending borders and removing geographical barriers. Electronic information exchange and networking poses a greater threat than ever before...
Managing Your Money All-In-One For Dummies
Managing Your Money All-In-One For Dummies
Want to take control of your finances once and for all? Managing Your Money All-in-One For Dummies combines expert money management with personal finance tips. From credit cards and insurance to taxes, investing, retirement, and more, seven mini-books show you how to improve your relationship with money — no matter your age or stage...
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy