eBooks-it.org Logo
eBooks-IT.org Inner Image

MIX eBooks Page 84

Download free MIX eBooks Page 84

Advanced Topics in Database Research

Volume 5
Advanced Topics in Database Research Image
Advanced Topics in Database Research is a series of books on the fields of database, software engineering, and systems analysis and design. They feature the latest research ideas and topics on how to enhance current database systems, improve information storage, refine existing database models, and develop advanced applications. Advanced Topics in Database Research, Volume 5 is a part of this series. Advanced Topics in Database Research, Volume 5 presents the latest research ideas and topics on database systems and applications, and provides insights into important developments in the field of database and database management. This book describes the capabilities and features of new technologies and methodologies, and presents state-of-the-art resear...

ISO27001 in a Windows Environment

The Best Practice Handbook for a Microsoft Windows Environment
ISO27001 in a Windows Environment Image
2nd Edition
A fundamental title that should be part of every information security practitioner s technical library! The vast majority of ISO27001 implementations will, to one extent or another, take place in a Windows environment. ISO27001 project managers are not always Microsoft technical experts, but a large number of the ISO27001 controls require a technical implementation. Bridging the gap between non-technical ISO27001 project managers and IT specialists, this book explains what the controls are, and describes how to implement them in a Windows environment, equipping the ISO27001 project manager to succeed with the implementation. MCSEs who have security tra...

E-Mail Security

A Pocket Guide
E-Mail Security Image
Don't let an email cause an information security incident at your company - buy this pocket guide today! Your business relies on email for its everyday dealings with partners, suppliers and customers. While email is an invaluable form of communication, it also represents a potential threat to your information security. Email could become the means for criminals to install a virus or malicious software on your computer system and fraudsters will try to use emails to obtain sensitive information through phishing scams. If you want to safeguard your company's ability to function, it is essential to have an effective email security policy in place, and to ensure your staff understand the risks associated with email. This pocket guide will help businesses...

Computer Forensics

A Pocket Guide
Computer Forensics Image
How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required....

Assessing Information Security

Strategies, Tactics, Logic and Framework
Assessing Information Security Image
What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Cybercrime...



2007 - 2017 © eBooks-IT.org