Pipe Flow 1 Single-phase Flow Assurance Dr. Ove Bratlan 
How to simulate liquid and gas flow in pipelines and networks. Includes a survey of existing software.
Download Link
http://www.mediafire.com/?znrdny1univ
----------------
Cyber-Security and Global Information Assurance 
In the 2003 publication, The National Strategy to Secure Cyberspace, the 
United States Government acknowledged, “our economy and national security is 
now fully dependent on information technology and the information 
infrastructure” (U. S. Government, 2003, p. 9). The candid use of the word 
“fully” is no overstatement. If the Internet infrastructure were 
significantly compromised, critical systems supporting supply chains, 
financial markets and telecommunications, for example, could simultaneously 
be severely handicapped or completely cease from functioning.
Table Of Contents:
Chapter I: Dynamic Modeling of the Cyber Security Threat Problem: The Black 
Market for Vulnerabilities
Chapter II: An Attack Graph Based Approach for Threat Identification of an 
Enterprise Network
Chapter III: Insider Threat Prevention, Detection and Mitigation
Chapter IV: An Autocorrelation Methodology for the Assessment of Security 
Assurance
Chapter V: Security Implications for Management from the Onset of Information 
Terrorism
Section II: Organizational and Human Security
Chapter VI: The Adoption of Information Security Management Standards: A 
Literature Review
Chapter VII: Data Smog, Techno Creep and the Hobbling of the Cognitive 
Dimension
Chapter VIII: Balancing the Public Policy Drivers in the Tension between 
Privacy and Security
Chapter IX: Human Factors in Security: The Role of Information Security 
Professionals within Organizations
Chapter X: Diagnosing Misfits, Inducing Requirements, and Delineating 
Transformations within Computer Network Operations Organizations
Chapter XI: An Approach to Managing Identity Fraud literature.
Section III: Emergency Response Planning
Chapter XII: A Repeatable Collaboration Process for Incident Response 
Planning
Chapter XIII: Pandemic Influenza, Worker Absenteeism and Impacts on Critical 
Infrastructures: Freight Transportation as an Illustration
Chapter XIV: Information Sharing: A Study of Information Attributes and their 
Relative Significance During Catastrophic Events
Chapter XV: An Overview of the Community Cyber Security Maturity Model
Section IV: Security Technologies
Chapter XVI: Server Hardening Model Development: A Methodology-Based Approach 
to Increased System Security
Chapter XVII: Trusted Computing: Evolution and Direction
Chapter XVIII: Introduction, Classification and Implementation of Honeypots
Product Details:
* ISBN: 1605663263
* ISBN-13: 9781605663265
* Format: Hardcover, 381pp
* Publisher: IGI Global
* Pub. Date: April 2009
Download Link
http://www.mediafire.com/?q2rdyjmcxwi
----------------
How to Secure and Audit Oracle 10g and 11g 
This guide demonstrates how to secure sensitive data and comply with 
internal and eternal audit regulations using Oracle 10g and 11g. It 
provides the hands-on guidance required to understand the complex options 
provided by Oracle and the know-how to choose the best option for a 
particular case. The book presents specific sequences of actions that 
should be taken to enable, configure, or administer security-related 
features. It includes best practices in securing Oracle and on Oracle 
security options and products. By providing specific instructions and 
examples this book bridges the gap between the individuals who install and 
configure a security feature and those who secure and audit it. 
Table Of Contents:
1 Introduction: How Th is Book Will Help You Be Secure and Compliant
2 Hardening the Database
3 Securing the Listener
4 Account Security
5 Cryptography, Oracle Wallets, and Oracle PKI
6 Authentication
7 Encrypting Data-in-Transit
8 Encrypting Data-at-Rest
9 Standard Auditing
10 Mandatory and Administrator Auditing
11 Fine-Grained Auditing
12 Auditing Before/After Values and Monitoring Selected Data
13 Oracle Audit Vault
14 Database Activity Monitoring
15 Privileges and Authorization
16 Virtual Private Database
17 Oracle Database Vault
Appendix A
Appendix B
Index
Product Details:
* ISBN: 1420084127
* ISBN-13: 9781420084122
* Format: Hardcover, 470pp
* Publisher: Taylor & Francis, Inc.
* Pub. Date: March 2009
Download Link
http://www.mediafire.com/file/xtgmolnyn3m
----------------
Information Technology Control and Audit 
Gallegos Frederick - Information Technology Control and Audit, Second Edition 
Information Technology Control and Audit, Second Edition is an excellent introductory textbook for IT auditing. It covers a wide range of topics in the field including the audit process, the legal environment of IT auditing, security and privacy, and much more.This textbook first examines the foundation of IT audit and control, discussing what IT auditing involves and the guidance provided by organizations in dealing with control and auditability issues. It then analyzes the process of audit and review, explores IT governance and control, and discusses the CobiT framework and steps that align IT decisions with business strategy. This volume examines project management processes that ensure that projects are controlled from inception through integration.It continues by addressing auditing IT acquisition and implementation, describing risks and controls as related to the life cycle of application systems. It highlights the purchase and installation of new systems, as well as change management. The next section examines the auditing of IT operations in both standalone and global environments, covering types of IT operation, issues related to specific platforms, risk and control assessment, and audit methods and support tools.The textbook concludes with a review of emerging issues, providing undergraduate and graduate students with a thorough overview of a topic critical to organizational security and integrity
Download Link
http://www.mediafire.com/file/yym4czzhduz
-----------------
Information Technology Control And Audit 3rd Edition 
Saturday, 05 December 2009 15:29 
Now in its third edition, this book is an excellent introductory reference to 
IT governance, controls, and auditing. It covers a wide range of topics in the 
field. It reviews pertinent legislation, discusses the future of auditing in 
the 21st century, and examines governance, strategy and standards, and 
acquisition and implementation. In a section on delivery and support, it 
explores service management, service continuity, systems management, and 
operations management. Finally, the authors review advanced topics such as 
virtual environment, virtual security, e-commerce, and enterprise resource 
planning. This new edition also includes guidelines for preparing for CISA 
Exam, and includes numerous illustrations, graphs and charts to help readers 
visualize the concepts. 
Table Of Contents:
I. A Foundation for IT Audit and Control
II. Auditing IT Planning and Organization 
III. IT Acquisition and Implementation 
IV. IT Delivery and Support 
V. Advanced Topics 
Appendices
Index 
Product Details:
* ISBN: 1420065505
* ISBN-13: 9781420065503
* Format: Hardcover, 728pp
* Publisher: Taylor & Francis, Inc.
* Pub. Date: November 2008
* Edition Number: 3
Download Link 
http://www.mediafire.com/file/qykqtymn5zm
----------------
Internal Audit 
Internal Audit: Efficiency Through Automation teaches state-of-the-art 
computer-aided audit techniques, with practical guidelines on how to get 
much needed data, overcome organizational roadblocks, build data analysis 
skills, as well as address Continuous Auditing issues. 
Table Of Contents:
Chapter 1 CAATTs History, 
Chapter 2 Audit Technology, 
Chapter 3 Continuous Auditing, 
Chapter 4 CAATTs Benefits and Opportunities, 
Chapter 5 CAATTs for Broader Scoped Audits, 
Chapter 6 Data Access and Testing, 
Chapter 7 Developing CAATT Capabilities, 
Chapter 8 Challenges for Audit, 
Product Details:
* ISBN: 0470392428
* ISBN-13: 9780470392423
* Format: Hardcover, 250pp
* Publisher: Wiley, John & Sons, Incorporated
* Pub. Date: December 2008
Download Link
http://www.mediafire.com/file/igkdnd1wytr
----------------
Measurement and Internal Audit 
Download Link
http://www.mediafire.com/file/ze5y4c4izmr
 
 
 Posts
Posts
 
