When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
PCI Express is the third-generation Peripheral Component Inter-connect technology for a wide range of systems and peripheral devices. Incorporating recent advances in high-speed, point-to-point interconnects, PCI Express provides significantly higher performance, reliability, and enhanced capabilities—at a lower...
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...
A practical introduction to writing synthesizable Verilog code
Rapid change in IC chip complexity and the pressure to design more complex IC chips at a faster pace has forced design engineers to find a more efficient and productive method to create schematics with large amounts of logic gates. This has led to the development of Verilog; one of...
This heavily revised second edition comprehensively reviews the use of optical coherence tomography (OCT) in cardiovascular practice. It provides detailed guidance on how to properly interpret OCT images and successfully utilise it in daily clinical practice Chapters cover the development and physics associated with OCT,...
The purpose of this manual is to provide the reader with a basic knowledge
of the principles and methods for the design, manufacturing, and
use of prestressed spun- and static-cast concrete poles for overhead utility
line structures. This manual is the result of a multiyear collaborative effort
by engineers from electric...
Completely refocused and reorganized, the new Edition of this respected resource offers you comprehensive, detailed, up-to-date, and clinically oriented coverage on all aspects of interventional cardiology. Edited by the world's most prominent specialist and researcher and contributed by more than 75 leaders in the field, this 5th edition...
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...
An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource...
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...