The Complete Guide for CISA Examination Success delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author, an IT security and
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is an internation
Offers an overview of how to develop a strategy to implement security within an organization. This managerial and practical technical tutorial for Windows NT/2000 presents in-depth knowledge on how, w
Presents the process of setting up a secure E-commerce Web site. This book includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. It highlights the plethora o
Explains the basic elements of disks and disk architectures, and explores how to successfully manage and maintain functionality within a Windows environment. This book features critical issues includi
A primer for learning SAS and analytics quickly, the book makes use of real-world data analysis steps. Filled with line-by-line code explanations, it is packed with fully functional and easily modifia
Helps readers understand the use of application servers in E-business. This book presents a comprehensive overview of the relevant technologies including CORBA, Java, web servers, and legacy systems.
After reviewing the failed attempts of carriers to retool for the future, this book describes the technologies and capabilities supporting next generation services, focusing particularly on multimedia
Surveying the major programming languages that have hallmarked the evolution of computing, Programming Language Fundamentals by Example provides an understanding of the many languages and notations us
This practical guide is a one-stop reference for IT professionals who must successfully master the realities of today's global sourcing environment. The author examines the reasons that an organizatio
A primer for learning SAS and analytics quickly, the book makes use of real-world data analysis steps. Filled with line-by-line code explanations, it is packed with fully functional and easily modifia
This book illustrates how the blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It details how blockchain is being blended with cloud computin
This book addresses the integration of all the new tools and technologies presented in today’s plethora of artificial intelligence tools and technologies to boost and enhance business intelligence. It
This book addresses the integration of all the new tools and technologies presented in today’s plethora of artificial intelligence tools and technologies to boost and enhance business intelligence. It
Two hot topics in recent years are data analytics and AI. Unfortunately, both communities have not done been communicating and collaborating with each other to build the necessary synergies. This book
Two hot topics in recent years are data analytics and AI. Unfortunately, both communities have not done been communicating and collaborating with each other to build the necessary synergies. This book
This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and data will not fall into the hands of a malicious thi
This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and data will not fall into the hands of a malicious thi
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to
This book outlines courses of action that organizational leaders and HR professionals can take to minimize the risks associated with insider threats and to minimize the losses when these threats mater
The AI revolution is moving at a breakneck speed. Organizations are beginning to invest in innovative ways to monetize their data through the use of artificial intelligence. Businesses need to underst
Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations. W
Deployment of Rare Earth Materials in Microware Devices, RF Transmitters, and Laser Systems describes the deployment of rare earth materials that offer significant improvement in the RF performance, r
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable se
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organi
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legi
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlook
The future of Internet security doesn’t lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the t
This book compares enterprise architecture (EA), which can be an all-encompassing model of an organization’s technical (IT) architecture, systems, contents (databases), interfaces, applications, and n
Creating a Greater Whole unlocks the not-so-secret secrets of what aspiring managers need to become strong leaders. This information-rich, easy to understand guide offers readers an immediate clear pa
This book presents the analysis, design, documentation, and quality of software solutions based on the OMG UML v2.5. Notably it covers 14 different modelling constructs including use case diagrams, ac
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that anti
The Project Management Professional® Certification exam is one of the most challenging exams anyone faces. Conquering this exam means facing a mountain of information and content from the field and fr
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobi
This book provides insight as to why and how current security management practices fail at their basic foundation, resulting in overall dissatisfaction by practitioners and lack of success in the corp