Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing the Audit Function: A Corporate Audit Department Procedures Guide
Managing the Audit Function: A Corporate Audit Department Procedures Guide

As auditing shifts from an outsourced function to a cornerstone of internal control, audit directors need an updated manual that reflects the radical changes the internal audit profession recently experienced in order to establish efficient processes for conducting successful audits. Managing the Audit Function, Third Edition, provides...

Expert Podcasting Practices For Dummies (Computer/Tech)
Expert Podcasting Practices For Dummies (Computer/Tech)

Revealed — the secrets to producing professional podcasts!

Record like a pro, build an audience, and maybe even generate some revenue

If you're ready to take your podcasting passion to the next level, you've picked up the right book. Here's what you need to know to create...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Patterns in Network Architecture: A Return to Fundamentals
Patterns in Network Architecture: A Return to Fundamentals
Groundbreaking Patterns for Building Simpler, More Powerful Networks

 

In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the...

Salesforce.com For Dummies (Computer/Tech)
Salesforce.com For Dummies (Computer/Tech)

Customize Salesforce for all your business needs

See how Salesforce helps manage accounts, market products, and improve service

Got something to sell? Work for somebody who does? You need salesforce.com, and this book tells you how to use it. Whether you're a salesperson,...

Hospital Epidemiology and Infection Control (Mayhall)
Hospital Epidemiology and Infection Control (Mayhall)
Thoroughly revised and updated for its Third Edition, this highly acclaimed volume is the most comprehensive reference on hospital epidemiology and infection control. In 115 chapters written by over 150 leading experts, the book examines every type of hospital-acquired (nosocomial) infection and addresses every issue relating to surveillance,...
A Brief History of Computing
A Brief History of Computing
The history of computing has its origins at the outset of civilization. As towns and communities evolved there was a need for increasingly sophisticated calculations. This book traces the evolution of computation, from early civilisations 3000 B.C. to the latest key developments in modern times.

This useful and lively text provides a...

Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals,...
Generic Model Management: Concepts and Algorithms (Lecture Notes in Computer Science)
Generic Model Management: Concepts and Algorithms (Lecture Notes in Computer Science)
Many challenging problems in information systems engineering involve the manipulation of complex metadata artifacts or models, such as database schema, interface specifications, or object diagrams, and mappings between models. Applications solving metadata manipulation problems are complex and hard to build. The goal of generic model management is...
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part I
Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part I
The four-volume set LNCS 3036, LNCS 3037, LNCS 3038 and LNCS 3039 constitutes the refereed proceedings of the 4th International Conference on Computational Science, ICCS 2004, held in Kraków, Poland in June 2004.

The four volumes present more than 550 reviewed contributed and invited papers of the main conference and its 30 workshops....

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Result Page: 736 735 734 733 732 731 730 729 728 727 726 725 724 723 722 721 720 719 718 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy