The industry-leading study guide for the CISA exam, fully updated
More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated twice a year, and this is the most up-to-date book available to prepare aspiring CISAs for the next exam.
CISAs are among the five highest-paid IT security professionals; more than 27,000 take the exam each year and the numbers are growing
Standards are updated twice a year, and this book offers the most up-to-date coverage as well as the proven Sybex approach that breaks down the content, tasks, and knowledge areas of the exam to cover every detail
Covers the IS audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, protecting information assets, disaster recovery, and more
Anyone seeking Certified Information Systems Auditor status will be fully prepared for the exam with the detailed information and approach found in this book.
SharePoint 2010 Enterprise Architect's Guidebook
MICROSOFT COLLABORATION and companion development technologies have really come a long
way over the past 20 years. Over this time, many different technologies have come and gone in
the blink of an eye. Others have built up momentum, improving with each new version, providing
valuable new features to meet the ever-increasing digital... Intrinsically Motivated Learning in Natural and Artificial Systems
It has become clear to researchers in robotics and adaptive behaviour that current approaches are yielding systems with limited autonomy and capacity for self-improvement. To learn autonomously and in a cumulative fashion is one of the hallmarks of intelligence, and we know that higher mammals engage in exploratory activities that are not...
Java and the Java Virtual Machine: Definition, Verification, Validation This book provides a high-level description, together with a mathematical and an experimental analysis, of Java and of the Java Virtual Machine (JVM), including a standard compiler of Java programs to JVM code and the security critical bytecode verifier component of the JVM. The description is structured into language layers and machine components....
Wireless Networking: Understanding Internetworking Challenges
This book focuses on providing a detailed and practical explanation of key existing and emerging wireless networking technologies and trends,while minimizing the amount of theoretical background information. The book also goes beyond simply presenting what the technology is, but also examines why the technology is the way it is, the history...
Activist Business Ethics “The truth can wait, for it lives a long life”
(Arthur Schopenhauer, German philosopher, 1788-1860)
The philosopher Schopenhauer believed in the eventual triumph of truth, despite the disappointments engendered by his indifferent contemporaries. Two centuries later, we live in a time of accelerated changes, and we do not...