IT Auditing Using Controls to Protect Information Assets, 2nd Edition
When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
HTTP Essentials: Protocols for Secure, Scaleable Web Sites Get inside HTTP and learn to build bulletproof Web sites
"This book is about what makes the Web tick. It explains the protocol that defines how Web browsers communicate with Web servers, the mechanisms that keep that communication secure from counterfeits and eavesdroppers, and the technologies that accelerate our Web experience."