Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Database Nation (Hardback)
Database Nation (Hardback)
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a...
Practical Risk Management
Practical Risk Management
In early 1995 people were glued to their television sets watching the aftermath of a very large earthquake in the city of Kobe in western Japan. Little did they suspect the deep-seated implications of this event on the financial markets in general, and on the Bank of England in particular. The earthquake caused a major sell-off in the already...
The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street
The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street

Chronicling the rise and fall of the efficient market theory and the century-long making of the modern financial industry, Justin Fox's The Myth of the Rational Market is as much an intellectual whodunit as a cultural history of the perils and possibilities of risk. The book brings to life the people and ideas that forged modern finance...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The first commercially available book to offer CISA study material

The CISA certification is a prerequisite for many audit and security job postings in the marketplace today. Becom-ing certified takes years of experience and exposure to information systems and risk and control techniques. In this book, John Kramer refers to his own experiences...

SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
Over the past few years I’ve been exposed to many different IT environments as part of a wide range of SOA initiatives for clients in both private and public sectors. While doing some work on a project for a client in the defense industry, I had an opportunity to learn more about not just their technical landscape, but also the various...
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

Simple Tools and Techniques for Enterprise Risk Management (The Wiley Finance Series)
Simple Tools and Techniques for Enterprise Risk Management (The Wiley Finance Series)
Providing strategic direction for a business means understanding what drives the creation of value and what destroys it. This in turn means the pursuit of opportunities must entail comprehension of the risks to take and the risks to avoid. Hence to grow any business entails risk judgement and risk acceptance. A business’s ability to prosper...
Handbook of Integrated Risk Management for E-Business: Measuring, Modeling, and Managing Risk
Handbook of Integrated Risk Management for E-Business: Measuring, Modeling, and Managing Risk
"This book provides a recipe for the practical application of technology and the implementation of solutions to solve specific problems." -- Dr. Krishna Nathan, Vice President, IBM Research

This ground-breaking professional reference integrates converging views of e-business processes and offers ways to
...
unlimited object storage image
Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy