• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working...

    • ASIN: B01GP09AS6

  • Accumulo: Application Development, Table Design, and Best Practices

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level secur...

    • ASIN: B010RHZ5SM

  • Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

    This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situ...

    • ASIN: B01JRFGQY2

  • Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

    This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digita...

    • ASIN: B00F8I24TY

  • Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery (The Morgan Kaufmann Series in Data Management Systems)

    Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most eff...

    • ASIN: 1558605088

  • Database encryption Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics

    The Toolkit contains the following practical and powerful enablers with new and updated Database encryption specific requirements:Step 1 get your bearings resources: The quick edition of the Database encryption Self Assessment book in PDF containing 49 requirements to perform a quickscan, get an overview and share with stakeholders, plus an example...

    • ASIN: B07B77P439
    • Brand: The Art of Service
    • UPC: 074528581129

  • PHP: Programming, Master's Handbook: A TRUE Beginner's Guide! Problem Solving, Code, Data Science, Data Structures & Algorithms (Code like a PRO in 24 ... r programming, iOS development)

    PHP Programming Like a PRO!New and Improved! Updated for Additional Content You’ve spoken and we’ve listened.The Master’s Handbook series has been REVAMPED!We thank you all greatly for the support =) “ this book makes it super easy to understand what you are doing and it is super easy to follow. “ - Emily White, from Amazon.com “ Thi...

    • ASIN: B00XWFQS9W

  • Designing a Total Data Solution: Technology, Implementation, and Deployment (Best Practices)


    • ASIN: B00OD53NB6

  • Business Continuity Planning: Protecting Your Organization's Life (Best Practices)

    Once considered a luxury, a business continuity plan has become a necessity. Many companies are required to have one by law. Others have implemented them to protect themselves from liability, and some have adopted them after a disaster or after a near miss. Whatever your reason, the right continuity plan is essential to your organization. Business ...

    • ASIN: B00UV9JCIG

  • Enterprise Systems Integration (Best Practices)

    The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integra...

    • ASIN: 0849311497
    • Brand: Brand: Auerbach Publications

  • CISA Certified Information Systems Auditor Study Guide, 4th Edition

    The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of this industry-leading study guide for the 2016 Certified Information System Auditor exam. This edition provided complete guidance toward all 2016 content areas, tasks, and knowledge areas of the ...

    • ASIN: 1119056241
    • Brand: imusti

  • Writing Secure Code for Windows Vista (Developer Best Practices)

    Get the definitive guide to writing more-secure code for Windows Vista—from the authors of the award-winning Writing Secure Code, Michael Howard and David LeBlanc. This reference is ideal for developers who understand the fundamentals of Windows programming and APIs. It complements Writing Secure Code, examining the delta between Windows XP and W...

    • ASIN: 0735623937
    • Brand: Brand: Microsoft Press

  • Oracle Forensics: Oracle Security Best Practices (Oracle In-Focus series) (Volume 26)

    Today’s Oracle professionals are challenged to protect their mission-critical data from many types of threats. Electronic data is being stolen is record amounts, and criminals are constantly devising sophisticated tools to breech your Oracle firewall. With advanced Oracle Forensics we can now proactively ensure the safety and security of our Orac...

    • ASIN: 0977671526

  • Validation and Verification of Knowledge Based Systems: Theory, Tools and Practice

    Knowledge-based (KB) technology is being applied to complex problem-solving and critical tasks in many application domains. Concerns have naturally arisen as to the dependability of knowledge-based systems (KBS). As with any software, attention to quality and safety must be paid throughout development of a KBS and rigorous verification and validati...

    • ASIN: 0792386450
    • UPC: 000792386450

  • Information Security: Principles and Practices

    For an introductory course in information security covering principles and practices.   This text covers the ten domains in the Information Security Common Body of Knowledge, which are Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, an...

    • ASIN: 0131547291

  • Maintenance and Reliability Best Practices

    Drawing upon the authors many years of shop floor and management experience in a variety of industries,

    • UPC: 17374072

  • Implementing Diversity: Best Practices for Making Diversity Work in Your Organization

    This practical and provocative guide provides the strategies and tactics used by organizations committed to implementing diversity from the top down. Focusing on the necessity for a strategic change initiative, Loden discusses: how to position

    • UPC: 25455699

  • AWS System Administration : Best Practices for Sysadmins in the Amazon Cloud

    With platforms designed for rapid adaptation and failure recovery such as Amazon Web Services, cloud computing is more like programming than traditional system administration. Tools for automatic scaling and instance replacement allow even small DevOps

    • UPC: 40401572

  • Effective Cybersecurity : A Guide to Using Best Practices and Standards

    The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use

    • UPC: 56133768

  • Web Content Management : Systems, Features, and Best Practices

    "Looking to select a web content management system (CMS), but confused about the promises, terminology, and buzzwords? Do you want to understand content management without having to dive into the underlying programming? This book provides

    • UPC: 44979023

  • Building a World-Class Compliance Program : Best Practices and Strategies for Success

    Written by a long-standing practitioner in the field, this timely and critical work is your best source for understanding all the complex issues and requirements associated with corporate compliance. It provides clear guidance for those

    • UPC: 8041910

  • CUDA Fortran for Scientists and Engineers : Best Practices for Efficient CUDA Fortran Programming

    CUDA Fortran for Scientists and Engineers: Best Practices for Efficient CUDA Fortran

    • UPC: 27548723

  • The Million-Dollar Financial Advisor Team : Best Practices from Top Performing Teams

    David Mullen, Jr., whose financial advisor program at Merrill Lynch had a success rate twice the industry average, shows advisors how to effectively offer wealth and financial management services under one roof to better service

    • UPC: 829055553

  • Handbook for Strategic HR : Best Practices in Organization Development from the OD Network

    In recent years, a transformation has occurred within the role of human resources departments. HR professionals are being called upon to determine priorities, craft strategies, and shape the culture within the business. This comprehensive handbook

    • UPC: 20973946

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Securing Azure SQL Database Managed Instance: Overview and best practices - BRK3163

    Managing encryption of data in the cloud (Google Cloud Next '17)

    Securing Your company's data: encryption, deletion and other best practices (Elissa Shevinsky)