 |
|
 Managing the Audit Function: A Corporate Audit Department Procedures GuideAs auditing shifts from an outsourced function to a cornerstone of internal control, audit directors need an updated manual that reflects the radical changes the internal audit profession recently experienced in order to establish efficient processes for conducting successful audits. Managing the Audit Function, Third Edition, provides... |  |  Expert Podcasting Practices For Dummies (Computer/Tech)Revealed — the secrets to producing professional podcasts!
Record like a pro, build an audience, and maybe even generate some revenue
If you're ready to take your podcasting passion to the next level, you've picked up the right book. Here's what you need to know to create... |  |  Gray Hat Hacking, Second EditionUncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out... |
|
 Patterns in Network Architecture: A Return to FundamentalsGroundbreaking Patterns for Building Simpler, More Powerful Networks
In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the... |  |  Salesforce.com For Dummies (Computer/Tech)Customize Salesforce for all your business needs
See how Salesforce helps manage accounts, market products, and improve service
Got something to sell? Work for somebody who does? You need salesforce.com, and this book tells you how to use it. Whether you're a salesperson,... |  |  Hospital Epidemiology and Infection Control (Mayhall)Thoroughly revised and updated for its Third Edition, this highly acclaimed volume is the most comprehensive reference on hospital epidemiology and infection control. In 115 chapters written by over 150 leading experts, the book examines every type of hospital-acquired (nosocomial) infection and addresses every issue relating to surveillance,... |
|
|
 Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |  |  Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part IThe four-volume set LNCS 3036, LNCS 3037, LNCS 3038 and LNCS 3039 constitutes the refereed proceedings of the 4th International Conference on Computational Science, ICCS 2004, held in Kraków, Poland in June 2004.
The four volumes present more than 550 reviewed contributed and invited papers of the main conference and its 30 workshops.... |  |  |
|
| Result Page: 736 735 734 733 732 731 730 729 728 727 726 725 724 723 722 721 720 719 718 |