From the invention of eyeglasses to the Internet, this three-volume set examines the pivotal effects that inventions have had on society, providing a fascinating history of technology and innovations in the United States from the earliest colonization by Europeans to the present. • Encourages readers to consider the tremendous potential impact of advances in science and technology and the ramifications of important inventions on the global market, human society, and even the planet as a whole • Supports eras addressed in the National Standards for American history as well as curricular units on inventions, discoveries, and technological advances • Includes primary documents, a chronology, and section openers that help readers contextualize the content
Step-by-step guide to successful implementation and control of IT systems—including the Cloud Many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments. Follows the approach used by the Information System Audit and Control Association's model curriculum, making this book a practical approach to IS auditing Serves as an excellent study guide for those preparing for the CISA and CISM exams Includes discussion of risk evaluation methodologies, new regulations, SOX, privacy, banking, IT governance, CobiT, outsourcing, network management, and the Cloud Includes a link to an education version of IDEA--Data Analysis Software As networks and enterprise resource planning systems bring resources together, and as increasing privacy violations threaten more organization, information systems integrity becomes more important than ever. Auditor's Guide to IT Auditing, Second Edition empowers auditors to effectively gauge the adequacy and effectiveness of information systems controls.
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. * Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise * Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints * Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
The Multi-Boot Configuration Handbook provides guidance to installing two or more OSes on a single computer. This book explains why things work the way they do and gives examples of real-world experience in using multiple operating systems in harmony with one another. You'll be able to coax several OSes into coexisting on one computer. You'll also understand something more about the basics of how a PC operates. See how to avoid the frustration of installing multiple operation systems. The Multi-Boot Configuration Handbook provides a guide to the intricacies of installing and maintaining a multi-OS computer.
Ruby Essentials provides a concise and easy to follow guide to learning Ruby. Everything from installing Ruby and the basics of the language through to topics such as arrays, file handling and object-oriented programming are covered, all combined with easy to understand code examples which serve to bridge the gap between theory and practice.Ruby Essentials is designed to be of equal use both to those experienced in other programming languages and to novices who have chosen Ruby as their "first programming language".