|
|
|
|
| | IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... | | Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... |
|
|
|
Managing Risk in Organizations: A Guide for ManagersManaging Risk in Organizations offers a proven framework for handling risks across all types of organizations. In this comprehensive resource, David Frame–a leading expert in risk management–examines the risks routinely encountered in business, offers prescriptions to assess the effects of various risks, and shows how to develop... | | Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... | | |
|
|
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 |