Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security Management Handbook, Sixth Edition
  • Language: en
  • Pages: 3279

Information Security Management Handbook, Sixth Edition

  • Type: Book
  • -
  • Published: 2007-05-14
  • -
  • Publisher: CRC Press

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.

Information Security Management Handbook, Volume 3
  • Language: en
  • Pages: 711

Information Security Management Handbook, Volume 3

  • Type: Book
  • -
  • Published: 2006-01-13
  • -
  • Publisher: CRC Press

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i

The Doughty Women: Susan - What Lies Before Us (Book 2)
  • Language: en

The Doughty Women: Susan - What Lies Before Us (Book 2)

This is book 2. The Doughty Women: Susan Susan Doughty is a Government Girl residing in Washington, D.C. in May of 1942. Sharing an apartment with two friends at the height of the war effort, she treks off to work every day at the Federal Bureau of Investigation in what has been, until now, a humdrum job. While she worries about her sister, famous war correspondent Kit Doughty, currently stationed in London and recently married, Susan finds herself yearning for her own adventures. Because, by comparison, her existence seems very tame, very safe. Humdrum. Alas for Susan. A wish once made cannot be easily unmade. Her promotion at work, from the fingerprinting division to one more secretive inv...

Information Security Management Handbook, Volume 7
  • Language: en
  • Pages: 374

Information Security Management Handbook, Volume 7

  • Type: Book
  • -
  • Published: 2013-08-29
  • -
  • Publisher: CRC Press

Updated annually, this is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledgerequired of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 CISSP Common Body of Knowledge (CBK), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.

Information Security Management Handbook, Volume 6
  • Language: en
  • Pages: 507

Information Security Management Handbook, Volume 6

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay

Information Security Management Handbook, Volume 5
  • Language: en
  • Pages: 560

Information Security Management Handbook, Volume 5

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook

Winning the Outsourcing Game
  • Language: en
  • Pages: 351

Winning the Outsourcing Game

  • Type: Book
  • -
  • Published: 2000-06-27
  • -
  • Publisher: CRC Press

It has become increasingly difficult to hire and keep warm bodies, not to mention competent IT personnel. With this in mind, outsourcing ceases to be an option and becomes a necessity. Web hosting, application service providers, and integrating legacy and ERP systems are just three examples of when outsourcing is the rule rather than the exception.

Enterprise Systems Integration
  • Language: en
  • Pages: 830

Enterprise Systems Integration

  • Type: Book
  • -
  • Published: 2001-09-26
  • -
  • Publisher: CRC Press

The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integra

New Directions in Project Management
  • Language: en
  • Pages: 561

New Directions in Project Management

  • Type: Book
  • -
  • Published: 2001-09-26
  • -
  • Publisher: CRC Press

Organizations that rely on computing technology for survival understand the critical importance of managing projects that meet strategic goals and objectives. The diversity of business globalization and electronic commerce combined with the unceasing pace of technical change continues to challenge efforts for more proficient project management tech

Strategic Information Security
  • Language: en
  • Pages: 234

Strategic Information Security

  • Type: Book
  • -
  • Published: 2003-11-24
  • -
  • Publisher: CRC Press

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now