Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...
The use of medicinal plants to treat everyday complaints and illnesses is becoming
ever more popular. This pocket guide is aimed not only at doctors and members
of the various healing professions interested in phytotherapy, but also in particular
at interested lay people, for whom this book is intended as a...
Bulletproof your organization against data breach, identity theft, and corporate espionage
In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...
As highways, crossing points, and urban streets become increasingly jammed with traffic, more and more roadway authorities are turning to electronic tolling and pricing to manage traffic and road usage. This authoritative book offers professionals expert guidance in planning, procuring, and operating electronic tolling and road-user charging...
'A must for any small business owner' Federation of Small Businesses Starting your own business can be a daunting task. The Financial Times Guide to Business Start Up is a comprehensive and trusted guide that will cover every important aspect of your business start up. It offers essential guidance on everything from developing your...
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...
Corporate Financial Accounting and Reporting is a comprehensive accounting textbook directed at those using financial reports. Its aim is to help current and future managers gain a thorough understanding of companies' published reports and is unique in the fact that it covers all three years of a traditional financial accounting course....
Information technologies are becoming pervasive and powerful to the point
that the privacy of citizens is now at risk. Indeed, more and more of our daily
transactions are conducted electronically and require us to transmit personal
information. Examples include using an electronic identity card to prove one’s
age in a...
The field of intellectual property (typically referred to as IP) is one that continues its rapid growth. Just a few years ago, individuals who identifi ed themselves as practitioners in the fi eld of intellectual property were met with blank stares. Now IP professionals are in constant demand, and it is a rare issue of any legal newspaper...
Establish a successful corporate blog to reach your customers
Corporate blogs require careful planning and attention to legal and corporate policies in order for them to be productive and effective. This fun, friendly, and practical guide walks you through using blogging as a first line of communication to customers and...
This book attempts to deal with financing and investment decision making, with particular
focus on the private sector of the UK economy. Its approach is to set out the theories
that surround each area of financial decision making and relate these to what
appears to happen in practice. Where theory and practice diverge, the book...