Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assists fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes.
This book explains the content, purpose and use of the eight standard knowledge areas that constitute the emerging discipline of cybersecurity. It captures and explains that body of knowledge, to provide teachers and students with a complete picture of the field at a suitable depth of understanding.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk managemen
The concept of "smart city" is used widely in general however, it is hard to explain because of the complexity and multidimensionality of this notion. In this context, we aim to contribute literature with a value-added approach where different AI applications of smart cities are discussed from different perspective.
The concept of "smart city" is used widely in general however, it is hard to explain because of the complexity and multidimensionality of this notion. In this context, we aim to contribute literature with a value-added approach where different AI applications of smart cities are discussed from different perspective.
This book will address the cybersecurity and cooperate governance challenges associated with enterprises, providing a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area.
The book is a tool for all auditors to understand some of the challenges, issues and potential alternative solutions when executing the role of university auditing. In addition, the book can be a valuable reference for university administrators, CIOs as well as academics and all stakeholders related to higher education sector.
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances.
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. It provides just enough practical skills and techniques for security leaders to get the job done.
This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits.
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book explains how to clarify management expectations for the internal audit and balance those expectations with the IIA Standards. It examines the concept of risk-based auditing and explains how to determine whether management and the internal audit team have the same objectives. It also looks at the internal auditor¿s role in corporate governance and fraud processes.
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.
This book focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.