Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
“Probably the most wide ranging and complete Linux device driver book I’ve read.”

--Alan Cox, Linux Guru and Key Kernel Developer

 

“Very comprehensive and detailed, covering almost every single Linux device driver type.”

...
PCI Express System Architecture
PCI Express System Architecture

PCI Express is the third-generation Peripheral Component Inter-connect technology for a wide range of systems and peripheral devices. Incorporating recent advances in high-speed, point-to-point interconnects, PCI Express provides significantly higher performance, reliability, and enhanced capabilities—at a lower...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Verilog Coding for Logic Synthesis
Verilog Coding for Logic Synthesis
A practical introduction to writing synthesizable Verilog code

Rapid change in IC chip complexity and the pressure to design more complex IC chips at a faster pace has forced design engineers to find a more efficient and productive method to create schematics with large amounts of logic gates. This has led to the development of Verilog; one of...

Cardiovascular OCT Imaging
Cardiovascular OCT Imaging

This heavily revised second edition comprehensively reviews the use of optical coherence tomography (OCT) in cardiovascular practice. It provides detailed guidance on how to properly interpret OCT images and successfully utilise it in daily clinical practice  Chapters cover the development and physics associated with OCT,...

Prestressed Concrete Transmission Pole Structures: Recommended Practice for Design and Installation (Asce Manual and Reports on Engineering Practice)
Prestressed Concrete Transmission Pole Structures: Recommended Practice for Design and Installation (Asce Manual and Reports on Engineering Practice)
The purpose of this manual is to provide the reader with a basic knowledge of the principles and methods for the design, manufacturing, and use of prestressed spun- and static-cast concrete poles for overhead utility line structures. This manual is the result of a multiyear collaborative effort by engineers from electric...
Textbook of Interventional Cardiology with DVD, 5e
Textbook of Interventional Cardiology with DVD, 5e

Completely refocused and reorganized, the new Edition of this respected resource offers you comprehensive, detailed, up-to-date, and clinically oriented coverage on all aspects of interventional cardiology. Edited by the world's most prominent specialist and researcher and contributed by more than 75 leaders in the field, this 5th edition...

The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...

Application Administrators Handbook: Installing, Updating and Troubleshooting Software
Application Administrators Handbook: Installing, Updating and Troubleshooting Software

An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy