Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance

This book explores diversity in boardrooms to highlight the link between the heterogeneous dimensions of board diversity and their impact on the firms. The book provides a brief definition of corporate governance and focuses on the role and functions of the board of directors. The work contributes to the literature enriching the...

Progress in Life Cycle Assessment 2019 (Sustainable Production, Life Cycle Engineering and Management)
Progress in Life Cycle Assessment 2019 (Sustainable Production, Life Cycle Engineering and Management)

This book covers the latest developments in life cycle assessment LCA both in terms of methodology and its application in various research areas. It includes methodological questions as well as case studies concerning energy and mobility, materials and engineering, sustainable construction and future technologies. With numerous...

CCNA Security Lab Manual
CCNA Security Lab Manual

The only authorized Lab Portfolio for the new Cisco Networking Academy CCNA Security Course

  • Gives CCNA Security students a comprehensive, printed and bound lab resource containing all of the course's labs, for use whenever Internet access isn't available
  • Handy printed...
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Principles of Financial Accounting
Principles of Financial Accounting

Needles/Powers/Crosson delivers interactive pedagogy by illustrating accounting principles and real-world examples to encourage critical thinking. This revision is based on an understanding of the nature, culture, and motivations of today's students and on extensive feedback from instructors. These substantial changes meet the needs of...

Principles of Accounting (Financial Accounting)
Principles of Accounting (Financial Accounting)

Needles/Powers/Crosson delivers interactive pedagogy by illustrating accounting principles and real-world examples to encourage critical thinking. This revision is based on an understanding of the nature, culture, and motivations of today's students and on extensive feedback from instructors. These substantial changes meet the needs of...

Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum computationmay seem to be a topic for science fiction, but small quantum computers have existed for several years and larger machines are on the drawing table. These efforts have been fueled by a tantalizing property: while conventional computers employ a binary representation that allows computational power to scale linearly with resources...
Cutting Edge PowerPoint 2007 For Dummies (Computer/Tech)
Cutting Edge PowerPoint 2007 For Dummies (Computer/Tech)
Get ready to add punch and pizzazz to your presentations and wow your audience using the latest PowerPoint techniques. This friendly book/CD-ROM combo covers all of the new features of Microsoft PowerPoint 2007, including interface changes, presentation themes, multimedia, the Slide Library, and more. The guide introduces you to the elements of...
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!

Microsoft Visio 2010 is a bold new release. If you’re new to Visio, your timing is excellent! This version of Visio is easier to use than ever before and yet the diagrams you create can have more impact and style, and can present more real-world data than in any previous version.

If you’ve used prior versions...

Coaching Positively: Lessons for Coaches from Positive Psychology (Coaching in Practice)
Coaching Positively: Lessons for Coaches from Positive Psychology (Coaching in Practice)

"If you are looking for an introductory book on how to do PP coaching, this will give you an excellent, clearly written, practical introduction with some useful references in the bibliography."
AICTP Newsletter, November 2012

"Coaching Positively is the book that the coaching profession...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy