Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Structured Query Language (SQL): a Practical Introduction
Structured Query Language (SQL): a Practical Introduction
Let's start from basics. What is a database? In very general terms, a database is a collection of related data. Notice the word related, this implies that the collection of letters on this page do not by themselves constitute a database. But if we think of them as a collection of letters arranged to form words, then they can be conceptualised as...
Concepts of Database Management
Concepts of Database Management
CONCEPTS OF DATABASE MANAGEMENT fits perfectly into any introductory database course for information systems, business or CIS programs. This concise text teaches SQL in a database-neutral environment with all major topics being covered, including E-R diagrams, normalization, and database design. Now in its seventh edition, CONCEPTS OF DATABASE...
On the Shoulders of Giants: A Course in Single Variable Calculus
On the Shoulders of Giants: A Course in Single Variable Calculus

This book presents an innovative treatment of single variable calculus designed as an introductory mathematics textbook for engineering and science students. The subject material is developed by modelling physical problems, some of which would normally be encountered by students as experiments in a first year physics course. The solutions of...

Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Repairing and Querying Databases under Aggregate Constraints (SpringerBriefs in Computer Science)
Repairing and Querying Databases under Aggregate Constraints (SpringerBriefs in Computer Science)
Research has deeply investigated several issues related to the use of integrity constraints on relational databases. In particular, a great deal of attention has been devoted to the problem of extracting "reliable" information from databases containing pieces of information inconsistent with regard to some integrity constraints. In...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating new information and getting rid of all outdated information, and yet in the process not disturb any other information in the database? The author has produced a formal method of specifying the...
Capitalism at the Crossroads: Next Generation Business Strategies for a Post-Crisis World (3rd Edition)
Capitalism at the Crossroads: Next Generation Business Strategies for a Post-Crisis World (3rd Edition)

“The central message of Stuart Hart’s book is that global business needs to be caring and be committed to preserving the globe’s ecological integrity. The ongoing economic slowdown brought about by rampant capitalism, the lessons from which this new edition of the book factors in, has only served to...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy