Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

The Leader's Tool Kit: Hundreds of Tips And Techniques for Developing the Skills You Need
The Leader's Tool Kit: Hundreds of Tips And Techniques for Developing the Skills You Need
Here's a book for leaders and aspiring leaders who must develop many skills but don't have much reading time to find the particular help they need. The Leader's Tool Kit gives them hundreds of proven techniques presented in bite-sized chunks and arranged in an easy-to-digest format. Readers will find handy checklists and practical advice...
Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Professional Team Foundation Server
Professional Team Foundation Server

This book is for project managers, IT administrators, and anyone whose role consists of administering Team Foundation Server on a daily basis, running a software project, setting up users, or handling security.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of...

Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

100 SOA Questions: Asked and Answered
100 SOA Questions: Asked and Answered

100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer,...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Sarbanes-Oxley Guide for Finance and Information Technology Professionals
Sarbanes-Oxley Guide for Finance and Information Technology Professionals

Sarbanes-Oxley and its international variants are here to stay.

Are you prepared for this new business reality?

Changing the landscape of corporate governance, financial disclosure, and the practice of public accounting, the Sarbanes-Oxley Act (SOX) can be confusing and complex for professionals and executives who must take...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy