Søkt på: Søkeresultat
totalt 10 treff
Fantastic Stories Presents the Fantastic Universe Super Pack #2
Fantastic Universe' started publishing in 1953 and continued until March 1960. It was one of the better magazines to launch during the boom in science fiction magazine publishing. …
Metrics and Methods for Security Risk Management
Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, …
Importance of Faith
The just shall live by his faith; without faith, it is impossible to please God. If you are a believer, you must live by your faith. Faith is a lifestyle for the believer, and the …
Risk and the Theory of Security Risk Assessment
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is …
Essentials of Forensic Accounting
Essentials of Forensic Accounting Essentials of Forensic Accounting is an authoritative resource covering a comprehensive range of forensic accounting topics. As a foundation …
Information Security Science
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk …
Science and Technology of Counterterrorism
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order …
Stewardship of the Built Environment
When we think of green building, we tend to picture new construction. But Robert A. Young argues that the greenest building is often the one that has already been built. In …
Essentials of Forensic Accounting
Essentials of Forensic Accounting Essentials of Forensic Accounting is an authoritative resource covering a comprehensive range of forensic accounting topics. As a foundation …
Cybercomplexity
This book tackles the problem of complexity within IT environments, i.e., "e;Cybercomplexity,"e; which is generally recognized as a principal source of cybersecurity risk. …