Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Sas 9.1 Language Reference Concepts
Sas 9.1 Language Reference Concepts
This title comprehensively documents essential concepts for SAS features, the DATA step, and SAS files, including general BASE SAS concepts, BASE SAS DATA, BASE SAS file concepts, and much more.

Base SAS software enables you to bring all your data into a single system. This title comprehensively documents essential concepts for SAS
...
Integrity and Internal Control in Information Systems VI
Integrity and Internal Control in Information Systems VI
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions:
  • what precisely do business managers need...
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
The Aerospace and Defence industry has been at the forefront of systems engineering for many decades. The imperatives of commercial success and / or military need have compelled those in the Industry to seize the opportunities offered by taking a systems engineering approach to solve a variety of complex problems.

The insights offered by
...
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Adobe Edge Animate CC For Dummies
Adobe Edge Animate CC For Dummies

The easy way to build HTML5 mobile and web apps using Adobe's new Edge Animate CC

Edge Animate CC is an approachable WYSIWYG alternative for leveraging the power of languages like HTML5, CSS3, and JavaScript to design and develop for the web and mobile devices, even if you have no programming experience. Written by...

MongoDB and Python: Patterns and processes for the popular document-oriented database
MongoDB and Python: Patterns and processes for the popular document-oriented database

Learn how to leverage MongoDB with your Python applications, using the hands-on recipes in this book. You get complete code samples for tasks such as making fast geo queries for location-based apps, efficiently indexing your user documents for social-graph lookups, and many other scenarios.

This guide explains the basics...

Unrigging American Elections: Reform Past and Prologue (Elections, Voting, Technology)
Unrigging American Elections: Reform Past and Prologue (Elections, Voting, Technology)
This critical and systematic analysis of election reforms post-HAVA (Help America Vote Act of 2002) offers a detailed look ahead at the significant challenges that remain in the context of a new presidential administration. Employing a mixed methodological approach, this book analyzes the biggest election challenges faced by voters...
Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

Configuration Management Principles and Practice
Configuration Management Principles and Practice

Configuration management (CM) is an important, but often neglected, practice that allows application developers and project managers to better identify potential problems, manage changes, and track the progress of software projects. An effective CM strategy—one that adheres to the practice's complexity while harnessing its depth—can...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy