• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: B01GP09AS6
    • ASIN: B01GP09AS6
    • Manufacturer: O'Reilly Media

  • Accumulo: Application Development, Table Design, and Best Practices

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.With clear information on system administration, performance tuning, and best practices, this book is ideal for developers seeking to write Accumulo applications, administrators charged with installing and maintaining Accumulo, and other professi... [Read More]

    • ASIN: B010RHZ5SM
    • ASIN: B010RHZ5SM
    • Manufacturer: O'Reilly Media

  • Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

    This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.Cybercrime continues to grow ... [Read More]

    • ASIN: B01JRFGQY2
    • ASIN: B01JRFGQY2
    • Manufacturer: Apress

  • Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

    This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.A step-by-step guide to designing, building and using a digital fore... [Read More]

    • ASIN: B00F8I24TY
    • ASIN: B00F8I24TY
    • Manufacturer: Syngress

  • Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery (The Morgan Kaufmann Series in Data Management Systems)

    Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions. The authors emphasize formal models that are easily applied across fields, that promise to remain val... [Read More]

    • ASIN: 1558605088
    • ASIN: 1558605088
    • ISBN: 1558605088
    • Manufacturer: Morgan Kaufmann

  • Database encryption Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics

    The Toolkit contains the following practical and powerful enablers with new and updated Database encryption specific requirements:Step 1 get your bearings resources: The quick edition of the Database encryption Self Assessment book in PDF containing 49 requirements to perform a quickscan, get an overview and share with stakeholders, plus an example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation. Step 2 set concrete goals resources: Featuring 670 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will... [Read More]

    • ASIN: B07B77P439
    • UPC: 074528581129
    • ASIN: B07B77P439
    • Brand: The Art of Service
    • Manufacturer: The Art of Service

  • PHP: Programming, Master's Handbook: A TRUE Beginner's Guide! Problem Solving, Code, Data Science, Data Structures & Algorithms (Code like a PRO in 24 ... r programming, iOS development)

    PHP Programming Like a PRO!New and Improved! Updated for Additional Content You’ve spoken and we’ve listened.The Master’s Handbook series has been REVAMPED!We thank you all greatly for the support =) “ this book makes it super easy to understand what you are doing and it is super easy to follow. “ - Emily White, from Amazon.com “ This book… was actually one of the best PHP books I've read“ - Brandon Nol, from Amazon.com “ If you’re into programming, this book will help you a lot. “ - Vincent, from Amazon.com Read this book for FREE on Kindle Unlimited NOW How woul... [Read More]

    • ASIN: B00XWFQS9W
    • ASIN: B00XWFQS9W

  • Designing a Total Data Solution: Technology, Implementation, and Deployment (Best Practices)

    • ASIN: B00OD53NB6
    • ASIN: B00OD53NB6
    • Manufacturer: Auerbach Publications

  • Business Continuity Planning: Protecting Your Organization's Life (Best Practices)

    Once considered a luxury, a business continuity plan has become a necessity. Many companies are required to have one by law. Others have implemented them to protect themselves from liability, and some have adopted them after a disaster or after a near miss. Whatever your reason, the right continuity plan is essential to your organization. Business Continuity Planning: Protecting Your Organization's Life explains how to evaluate your current plan for completeness, create an effective plan if you don't have one, and ensure it remains up-to-date.From fires, floods, and power outages to hackers an... [Read More]

    • ASIN: B00UV9JCIG
    • ASIN: B00UV9JCIG
    • Manufacturer: Auerbach Publications

  • Enterprise Systems Integration (Best Practices)

    The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration, Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration.The book combines the perspectives, knowledge, and experience... [Read More]

    • ASIN: 0849311497
    • ASIN: 0849311497
    • ISBN: 0849311497
    • Brand: Brand: Auerbach Publications
    • Manufacturer: Auerbach Publications

  • CISA Certified Information Systems Auditor Study Guide, 4th Edition

    The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of this industry-leading study guide for the 2016 Certified Information System Auditor exam. This edition provided complete guidance toward all 2016 content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and bu... [Read More]

    • ASIN: 1119056241
    • ASIN: 1119056241
    • ISBN: 1119056241
    • Brand: imusti
    • Manufacturer: Sybex

  • Writing Secure Code for Windows Vista (Developer Best Practices)

    Get the definitive guide to writing more-secure code for Windows Vista—from the authors of the award-winning Writing Secure Code, Michael Howard and David LeBlanc. This reference is ideal for developers who understand the fundamentals of Windows programming and APIs. It complements Writing Secure Code, examining the delta between Windows XP and Windows Vista security. You get first-hand insights into design decisions, lessons learned from Windows Vista development, and practical advice for solving real-world security issues. Discover how to: Develop applications to run without administrato... [Read More]

    • ASIN: 0735623937
    • ASIN: 0735623937
    • ISBN: 0735623937
    • Brand: Brand: Microsoft Press
    • Manufacturer: Microsoft Press

  • Oracle Forensics: Oracle Security Best Practices (Oracle In-Focus series) (Volume 26)

    Today’s Oracle professionals are challenged to protect their mission-critical data from many types of threats. Electronic data is being stolen is record amounts, and criminals are constantly devising sophisticated tools to breech your Oracle firewall. With advanced Oracle Forensics we can now proactively ensure the safety and security of our Oracle data, and all Oracle Forensics techniques are part of the due diligence that is required for all production databases. A failure to apply Forensics techniques to identify unseen threats can lead to a disaster, and this book is required reading for... [Read More]

    • ASIN: 0977671526
    • ASIN: 0977671526
    • ISBN: 0977671526
    • Manufacturer: Rampant Techpress

  • Validation and Verification of Knowledge Based Systems: Theory, Tools and Practice

    Knowledge-based (KB) technology is being applied to complex problem-solving and critical tasks in many application domains. Concerns have naturally arisen as to the dependability of knowledge-based systems (KBS). As with any software, attention to quality and safety must be paid throughout development of a KBS and rigorous verification and validation (V&V) techniques must be employed. Research in V&V of KBS has emerged as a distinct field only in the last decade and is intended to address issues associated with quality and safety aspects of KBS and to credit such applications with the same deg... [Read More]

    • ASIN: 0792386450
    • UPC: 000792386450
    • ASIN: 0792386450
    • ISBN: 0792386450
    • Manufacturer: Springer

  • Information Security: Principles and Practices

    For an introductory course in information security covering principles and practices.   This text covers the ten domains in the Information Security Common Body of Knowledge, which are Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.

    • ASIN: 0131547291
    • ASIN: 0131547291
    • ISBN: 0131547291
    • Manufacturer: Prentice Hall

  • Maintenance and Reliability Best Practices

    Drawing upon the authors many years of shop floor and management experience in a variety of industries,

    • UPC: 17374072

  • Implementing Diversity: Best Practices for Making Diversity Work in Your Organization

    This practical and provocative guide provides the strategies and tactics used by organizations committed to implementing diversity from the top down. Focusing on the necessity for a strategic change initiative, Loden discusses: how to position

    • UPC: 25455699

  • AWS System Administration : Best Practices for Sysadmins in the Amazon Cloud

    With platforms designed for rapid adaptation and failure recovery such as Amazon Web Services, cloud computing is more like programming than traditional system administration. Tools for automatic scaling and instance replacement allow even small DevOps

    • UPC: 40401572

  • Effective Cybersecurity : A Guide to Using Best Practices and Standards

    The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use

    • UPC: 56133768

  • Web Content Management : Systems, Features, and Best Practices

    "Looking to select a web content management system (CMS), but confused about the promises, terminology, and buzzwords? Do you want to understand content management without having to dive into the underlying programming? This book provides

    • UPC: 44979023

  • Building a World-Class Compliance Program : Best Practices and Strategies for Success

    Written by a long-standing practitioner in the field, this timely and critical work is your best source for understanding all the complex issues and requirements associated with corporate compliance. It provides clear guidance for those

    • UPC: 8041910

  • CUDA Fortran for Scientists and Engineers : Best Practices for Efficient CUDA Fortran Programming

    CUDA Fortran for Scientists and Engineers: Best Practices for Efficient CUDA Fortran

    • UPC: 27548723

  • The Million-Dollar Financial Advisor Team : Best Practices from Top Performing Teams

    David Mullen, Jr., whose financial advisor program at Merrill Lynch had a success rate twice the industry average, shows advisors how to effectively offer wealth and financial management services under one roof to better service

    • UPC: 829055553

  • Handbook for Strategic HR : Best Practices in Organization Development from the OD Network

    In recent years, a transformation has occurred within the role of human resources departments. HR professionals are being called upon to determine priorities, craft strategies, and shape the culture within the business. This comprehensive handbook

    • UPC: 20973946

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Securing Azure SQL Database Managed Instance: Overview and best practices - BRK3163

    Managing encryption of data in the cloud (Google Cloud Next '17)

    Securing Your company's data: encryption, deletion and other best practices (Elissa Shevinsky)