Download E-books Securing the Virtual Environment: How to Defend the Enterprise Against Attack PDF

By Davi Ottenheimer, Matthew Wallace

A step by step consultant to settling on and protecting opposed to assaults at the digital environment
As progressively more info is moved into digital environments the necessity to safe them turns into more and more very important. worthwhile for carrier services in addition to firm and small enterprise IT execs the publication bargains a extensive glance throughout virtualization utilized in a variety of industries in addition to a slender view of vulnerabilities particular to digital environments. A better half DVD is integrated with recipes and trying out scripts.

• Examines the adaptation in a digital version as opposed to conventional computing types and the proper know-how and systems to safeguard it from attack
• Dissects and exposes assaults detailed on the digital surroundings and the stairs precious for defense
• Covers info safety in digital environments: construction a digital assault lab, discovering leaks, getting a side-channel, denying or compromising prone, abusing the hypervisor, forcing an interception, and spreading infestations
• Accompanying DVD contains hands-on examples and code
• This how-to consultant palms IT managers, proprietors, and designers of digital environments with the instruments they should defend opposed to universal threats.

Show description

By Davi Ottenheimer, Matthew Wallace

A step by step consultant to settling on and protecting opposed to assaults at the digital environment
As progressively more info is moved into digital environments the necessity to safe them turns into more and more very important. worthwhile for carrier services in addition to firm and small enterprise IT execs the publication bargains a extensive glance throughout virtualization utilized in a variety of industries in addition to a slender view of vulnerabilities particular to digital environments. A better half DVD is integrated with recipes and trying out scripts.

• Examines the adaptation in a digital version as opposed to conventional computing types and the proper know-how and systems to safeguard it from attack
• Dissects and exposes assaults detailed on the digital surroundings and the stairs precious for defense
• Covers info safety in digital environments: construction a digital assault lab, discovering leaks, getting a side-channel, denying or compromising prone, abusing the hypervisor, forcing an interception, and spreading infestations
• Accompanying DVD contains hands-on examples and code
• This how-to consultant palms IT managers, proprietors, and designers of digital environments with the instruments they should defend opposed to universal threats.

Show description

Continue reading "Download E-books Securing the Virtual Environment: How to Defend the Enterprise Against Attack PDF"

Download E-books Networking: A Beginner's Guide, Sixth Edition PDF

Current, crucial IT networking skills--made easy!

Thoroughly revised to hide the newest applied sciences, this useful source offers you an effective origin in networking basics. Networking: A Beginner's Guide, 6th variation discusses stressed and instant community layout, configuration, undefined, protocols, defense, backup, restoration, and virtualization. you will additionally get step by step directions for fitting, configuring, and handling home windows Server 2012, alternate Server 2013, Oracle Linux, and Apache. this can be the best e-book for a person beginning a networking profession or short of an easy-to-follow refresher.

  • Understand community cabling, topologies, undefined, and the OSI seven-layer version
  • Connect LANs and WANs
  • Configure community protocols, akin to TCP/IP, IPX/SPX, SMTP, DHCP, HTTP, WINS, and extra
  • Explore listing prone, reminiscent of Microsoft's energetic listing, X.400, and LDAP
  • Enable and aid distant community entry
  • Secure your community and deal with backup and catastrophe restoration
  • Select, set up, and deal with trustworthy community servers, together with home windows Server 2012, alternate Server 2013, Oracle Linux, and Apache
  • Manage community laptop pcs
  • Design a strong community from the floor up
  • Work with virtualization applied sciences, resembling Hyper-V, VMWare, and Oracle VM VirtualBox

Show description

Current, crucial IT networking skills--made easy!

Thoroughly revised to hide the newest applied sciences, this useful source offers you an effective origin in networking basics. Networking: A Beginner's Guide, 6th variation discusses stressed and instant community layout, configuration, undefined, protocols, defense, backup, restoration, and virtualization. you will additionally get step by step directions for fitting, configuring, and handling home windows Server 2012, alternate Server 2013, Oracle Linux, and Apache. this can be the best e-book for a person beginning a networking profession or short of an easy-to-follow refresher.

  • Understand community cabling, topologies, undefined, and the OSI seven-layer version
  • Connect LANs and WANs
  • Configure community protocols, akin to TCP/IP, IPX/SPX, SMTP, DHCP, HTTP, WINS, and extra
  • Explore listing prone, reminiscent of Microsoft's energetic listing, X.400, and LDAP
  • Enable and aid distant community entry
  • Secure your community and deal with backup and catastrophe restoration
  • Select, set up, and deal with trustworthy community servers, together with home windows Server 2012, alternate Server 2013, Oracle Linux, and Apache
  • Manage community laptop pcs
  • Design a strong community from the floor up
  • Work with virtualization applied sciences, resembling Hyper-V, VMWare, and Oracle VM VirtualBox

Show description

Continue reading "Download E-books Networking: A Beginner's Guide, Sixth Edition PDF"

Download E-books Reverse Deception: Organized Cyber Threat Counter-Exploitation PDF

By Sean Bodmer, Gregory Carpenter

In-depth counterintelligence strategies to struggle cyber-espionage

"A accomplished and unprecedented evaluation of the subject by means of specialists within the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of complex continual threats (APTs) utilizing the verified safeguard suggestions and real-world case reports featured during this specific consultant. Reverse Deception: geared up Cyber probability Counter-Exploitation exhibits tips on how to examine your network’s vulnerabilities, 0 in on objectives, and successfully block intruders. become aware of how one can manage electronic traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and establish malicious software program teams. The specialist authors offer complete insurance of felony and moral matters, operational vetting, and safety crew administration.

  • Establish the ambitions and scope of your opposite deception crusade
  • Identify, research, and block APTs
  • Engage and capture nefarious members and their enterprises
  • Assemble cyber-profiles, incident analyses, and intelligence reviews
  • Uncover, put off, and post-mortem crimeware, trojans, and botnets
  • Work with intrusion detection, anti-virus, and electronic forensics instruments
  • Employ stealth honeynet, honeypot, and sandbox applied sciences
  • Communicate and collaborate with criminal groups and legislation enforcement

Show description

By Sean Bodmer, Gregory Carpenter

In-depth counterintelligence strategies to struggle cyber-espionage

"A accomplished and unprecedented evaluation of the subject by means of specialists within the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of complex continual threats (APTs) utilizing the verified safeguard suggestions and real-world case reports featured during this specific consultant. Reverse Deception: geared up Cyber probability Counter-Exploitation exhibits tips on how to examine your network’s vulnerabilities, 0 in on objectives, and successfully block intruders. become aware of how one can manage electronic traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and establish malicious software program teams. The specialist authors offer complete insurance of felony and moral matters, operational vetting, and safety crew administration.

  • Establish the ambitions and scope of your opposite deception crusade
  • Identify, research, and block APTs
  • Engage and capture nefarious members and their enterprises
  • Assemble cyber-profiles, incident analyses, and intelligence reviews
  • Uncover, put off, and post-mortem crimeware, trojans, and botnets
  • Work with intrusion detection, anti-virus, and electronic forensics instruments
  • Employ stealth honeynet, honeypot, and sandbox applied sciences
  • Communicate and collaborate with criminal groups and legislation enforcement

Show description

Continue reading "Download E-books Reverse Deception: Organized Cyber Threat Counter-Exploitation PDF"

Download E-books Higher Education in the Digital Age PDF

By William G. Bowen

Two of the main seen and significant tendencies in larger schooling this present day are its exploding bills and the swift enlargement of on-line studying. may well the expansion in on-line classes gradual the emerging expense of school and aid clear up the obstacle of affordability? during this brief and incisive ebook, William G. Bowen, one of many greatest specialists at the intersection of schooling and economics, explains why, regardless of his previous skepticism, he now believes know-how has the capability to aid rein in bills with out negatively affecting scholar studying. As a former president of Princeton college, an economist, and writer of many books on schooling, together with the acclaimed bestseller The form of the River, Bowen speaks with distinctive services at the subject.

Surveying the dizzying array of latest technology-based educating and studying projects, together with the hugely publicized emergence of "massive open on-line classes" (MOOCs), Bowen argues that such applied sciences might remodel conventional greater education--allowing it eventually to reduce emerging expenditures via expanding productiveness, whereas maintaining caliber and maintaining center values. however the demanding situations, that are organizational and philosophical up to technological, are daunting. They comprise delivering not easy proof of even if on-line schooling is reasonable in numerous settings, rethinking the governance and decision-making constructions of upper schooling, and constructing customizable technological systems. but, Bowen continues to be positive that the aptitude payoff is great.

Based at the 2012 Tanner Lectures on Human Values, brought at Stanford college, the publication comprises responses from Stanford president John Hennessy, Harvard college psychologist Howard Gardner, Columbia collage literature professor Andrew Delbanco, and Coursera cofounder Daphne Koller.

Show description

By William G. Bowen

Two of the main seen and significant tendencies in larger schooling this present day are its exploding bills and the swift enlargement of on-line studying. may well the expansion in on-line classes gradual the emerging expense of school and aid clear up the obstacle of affordability? during this brief and incisive ebook, William G. Bowen, one of many greatest specialists at the intersection of schooling and economics, explains why, regardless of his previous skepticism, he now believes know-how has the capability to aid rein in bills with out negatively affecting scholar studying. As a former president of Princeton college, an economist, and writer of many books on schooling, together with the acclaimed bestseller The form of the River, Bowen speaks with distinctive services at the subject.

Surveying the dizzying array of latest technology-based educating and studying projects, together with the hugely publicized emergence of "massive open on-line classes" (MOOCs), Bowen argues that such applied sciences might remodel conventional greater education--allowing it eventually to reduce emerging expenditures via expanding productiveness, whereas maintaining caliber and maintaining center values. however the demanding situations, that are organizational and philosophical up to technological, are daunting. They comprise delivering not easy proof of even if on-line schooling is reasonable in numerous settings, rethinking the governance and decision-making constructions of upper schooling, and constructing customizable technological systems. but, Bowen continues to be positive that the aptitude payoff is great.

Based at the 2012 Tanner Lectures on Human Values, brought at Stanford college, the publication comprises responses from Stanford president John Hennessy, Harvard college psychologist Howard Gardner, Columbia collage literature professor Andrew Delbanco, and Coursera cofounder Daphne Koller.

Show description

Continue reading "Download E-books Higher Education in the Digital Age PDF"

Download E-books Inside Microsoft SQL Server 2008 T-SQL Programming (Developer Reference) PDF

By Itzik Ben-Gan, Greg Low

Get an in depth examine the interior structure of T-SQL with this entire programming reference. Database builders and directors get most sensible practices, professional concepts, and code samples to grasp the intricacies of this programming language—solving advanced issues of real-world solutions.

Discover how to:

  • Work with T-SQL and CLR user-defined services, kept tactics, and triggers.
  • Handle transactions, concurrency, and blunder handling.
  • Efficiently use transitority items, together with transitority tables, desk variables, and desk expressions.
  • Evaluate whilst to take advantage of set-based programming strategies and while to take advantage of cursors.
  • Work with dynamic SQL in a good and safe manner.
  • Treat date- and time-related info in a powerful manner.
  • Develop CLR user-defined varieties and know about temporal help within the relational model.
  • Use XML and XQuery and enforce a dynamic schema solution.
  • Work with spatial facts utilizing the recent geometry and geography forms and spatial indexes.
  • Track entry and adjustments to facts utilizing prolonged occasions, SQL Server Audit, swap monitoring, and alter information capture.
  • Use provider dealer for managed asynchronous processing in database applications.

All the book’s code samples should be to be had for obtain from the significant other internet site.

Show description

By Itzik Ben-Gan, Greg Low

Get an in depth examine the interior structure of T-SQL with this entire programming reference. Database builders and directors get most sensible practices, professional concepts, and code samples to grasp the intricacies of this programming language—solving advanced issues of real-world solutions.

Discover how to:

  • Work with T-SQL and CLR user-defined services, kept tactics, and triggers.
  • Handle transactions, concurrency, and blunder handling.
  • Efficiently use transitority items, together with transitority tables, desk variables, and desk expressions.
  • Evaluate whilst to take advantage of set-based programming strategies and while to take advantage of cursors.
  • Work with dynamic SQL in a good and safe manner.
  • Treat date- and time-related info in a powerful manner.
  • Develop CLR user-defined varieties and know about temporal help within the relational model.
  • Use XML and XQuery and enforce a dynamic schema solution.
  • Work with spatial facts utilizing the recent geometry and geography forms and spatial indexes.
  • Track entry and adjustments to facts utilizing prolonged occasions, SQL Server Audit, swap monitoring, and alter information capture.
  • Use provider dealer for managed asynchronous processing in database applications.

All the book’s code samples should be to be had for obtain from the significant other internet site.

Show description

Continue reading "Download E-books Inside Microsoft SQL Server 2008 T-SQL Programming (Developer Reference) PDF"

Download E-books CHIP [MY] (August 2015) PDF

PDF | English | 132 pages

CHIP Malaysia is one among Malaysia’s longest working IT magazines and is now synonymous with electronic way of life and know-how. The journal is finally the software to teach readers present and destiny tendencies and applied sciences, and convey how they could use them successfully during this electronic international.

Show description

PDF | English | 132 pages

CHIP Malaysia is one among Malaysia’s longest working IT magazines and is now synonymous with electronic way of life and know-how. The journal is finally the software to teach readers present and destiny tendencies and applied sciences, and convey how they could use them successfully during this electronic international.

Show description

Continue reading "Download E-books CHIP [MY] (August 2015) PDF"

Download E-books The Digital Hand, Volume 3: How Computers Changed the Work of American Public Sector Industries PDF

By James W. Cortada

Within the 3rd quantity of The electronic Hand, James W. Cortada completes his sweeping survey of the impression of pcs on American undefined, turning eventually to the general public area, and analyzing how desktops have essentially replaced the character of labor in govt and schooling. This booklet is going some distance past generalizations in regards to the info Age to the specifics of the way industries have functioned, now functionality, and should functionality within the future years. Cortada combines distinctive research with narrative historical past to supply a large review of computings and telecommunications function within the complete public area, together with federal, nation, and native governments, and in K-12 and better schooling. starting in 1950, whilst advertisement functions of electronic know-how began appearing, Cortada examines the original methods diverse public area industries followed new applied sciences, showcasing the style during which their cutting edge purposes prompted different industries, in addition to the U.S. economic system as an entire.

He builds at the surveys offered within the first quantity of the sequence, which tested 16 production, procedure, transportation, wholesale and retail industries, and the second one quantity, which tested over a dozen monetary, telecommunications, media, and leisure industries. With this 3rd quantity, The electronic Hand trilogy is whole, and varieties the main complete and conscientiously researched background of computing in enterprise on account that 1950, supplying an in depth photo of what the infrastructure of the knowledge Age rather feels like and the way we received there. Managers, historians, economists, and people operating within the public zone will take pleasure in Cortada's research of electronic technology's many jobs and destiny probabilities.

Show description

By James W. Cortada

Within the 3rd quantity of The electronic Hand, James W. Cortada completes his sweeping survey of the impression of pcs on American undefined, turning eventually to the general public area, and analyzing how desktops have essentially replaced the character of labor in govt and schooling. This booklet is going some distance past generalizations in regards to the info Age to the specifics of the way industries have functioned, now functionality, and should functionality within the future years. Cortada combines distinctive research with narrative historical past to supply a large review of computings and telecommunications function within the complete public area, together with federal, nation, and native governments, and in K-12 and better schooling. starting in 1950, whilst advertisement functions of electronic know-how began appearing, Cortada examines the original methods diverse public area industries followed new applied sciences, showcasing the style during which their cutting edge purposes prompted different industries, in addition to the U.S. economic system as an entire.

He builds at the surveys offered within the first quantity of the sequence, which tested 16 production, procedure, transportation, wholesale and retail industries, and the second one quantity, which tested over a dozen monetary, telecommunications, media, and leisure industries. With this 3rd quantity, The electronic Hand trilogy is whole, and varieties the main complete and conscientiously researched background of computing in enterprise on account that 1950, supplying an in depth photo of what the infrastructure of the knowledge Age rather feels like and the way we received there. Managers, historians, economists, and people operating within the public zone will take pleasure in Cortada's research of electronic technology's many jobs and destiny probabilities.

Show description

Continue reading "Download E-books The Digital Hand, Volume 3: How Computers Changed the Work of American Public Sector Industries PDF"

Download E-books ITIL Service Strategy (2011 Edition) PDF

By Cabinet Office

The ITIL 2011 variants were up to date for readability, consistency, correctness and completeness. ITIL provider procedure presents a view of ITIL that aligns enterprise and IT in order that each one brings out the simplest within the different. It guarantees that each level of the provider lifecycle remains occupied with the company case and pertains to all of the better half technique components that persist with. next titles will hyperlink deliverables to assembly the enterprise ambitions, requisites and repair administration ideas defined during this ebook. Key positive aspects The up-to-date ITIL guides percentage the same general constitution (including commonplace content material in Chapters 1, 2 and 6), to enhance consistency and relief navigation. a few content material has been reorganized to enhance movement and clarity, and make sure alignment around the suite together with explanation round interfaces, and inputs and outputs around the carrier lifecycle. Terminology has been clarified and made constant around the courses and the ITIL word list. precis of Updates from the writer The options in the booklet were clarified, with no altering the final message. The up to date book contains simpler counsel and extra examples the place suitable. The newly outlined means of method administration for IT companies is answerable for constructing and preserving enterprise and IT recommendations, and there are actually separate descriptions of industrial approach and IT procedure. monetary administration has been improved, and enterprise courting administration and insist administration are actually lined as processes.

Note: Vector PDF - absolutely bookmarked, searchable.

Show description

By Cabinet Office

The ITIL 2011 variants were up to date for readability, consistency, correctness and completeness. ITIL provider procedure presents a view of ITIL that aligns enterprise and IT in order that each one brings out the simplest within the different. It guarantees that each level of the provider lifecycle remains occupied with the company case and pertains to all of the better half technique components that persist with. next titles will hyperlink deliverables to assembly the enterprise ambitions, requisites and repair administration ideas defined during this ebook. Key positive aspects The up-to-date ITIL guides percentage the same general constitution (including commonplace content material in Chapters 1, 2 and 6), to enhance consistency and relief navigation. a few content material has been reorganized to enhance movement and clarity, and make sure alignment around the suite together with explanation round interfaces, and inputs and outputs around the carrier lifecycle. Terminology has been clarified and made constant around the courses and the ITIL word list. precis of Updates from the writer The options in the booklet were clarified, with no altering the final message. The up to date book contains simpler counsel and extra examples the place suitable. The newly outlined means of method administration for IT companies is answerable for constructing and preserving enterprise and IT recommendations, and there are actually separate descriptions of industrial approach and IT procedure. monetary administration has been improved, and enterprise courting administration and insist administration are actually lined as processes.

Note: Vector PDF - absolutely bookmarked, searchable.

Show description

Continue reading "Download E-books ITIL Service Strategy (2011 Edition) PDF"

Download E-books A Hacker Manifesto PDF

By McKenzie Wark

A double is haunting the world--the double of abstraction, the digital fact of data, programming or poetry, math or tune, curves or shades upon which the fortunes of states and armies, businesses and groups now rely. The daring target of this publication is to make take place the origins, objective, and pursuits of the rising category accountable for making this new world--for generating the recent options, new perceptions, and new sensations out of the stuff of uncooked facts.

A Hacker Manifesto deftly defines the fraught territory among the ever extra strident calls for through drug and media businesses for defense in their patents and copyrights and the pervasive pop culture of dossier sharing and pirating. This vexed floor, the world of so-called "intellectual property," supplies upward thrust to an entire new type of classification clash, one who pits the creators of information--the hacker classification of researchers and authors, artists and biologists, chemists and musicians, philosophers and programmers--against a owning classification who may monopolize what the hacker produces.

Drawing in equivalent degree on man Debord and Gilles Deleuze, A Hacker Manifesto deals a scientific restatement of Marxist suggestion for the age of our on-line world and globalization. within the common insurrection opposed to commodified details, McKenzie Wark sees a utopian promise, past the valuables shape, and a brand new revolutionary category, the hacker classification, who voice a shared curiosity in a brand new details commons.

Show description

By McKenzie Wark

A double is haunting the world--the double of abstraction, the digital fact of data, programming or poetry, math or tune, curves or shades upon which the fortunes of states and armies, businesses and groups now rely. The daring target of this publication is to make take place the origins, objective, and pursuits of the rising category accountable for making this new world--for generating the recent options, new perceptions, and new sensations out of the stuff of uncooked facts.

A Hacker Manifesto deftly defines the fraught territory among the ever extra strident calls for through drug and media businesses for defense in their patents and copyrights and the pervasive pop culture of dossier sharing and pirating. This vexed floor, the world of so-called "intellectual property," supplies upward thrust to an entire new type of classification clash, one who pits the creators of information--the hacker classification of researchers and authors, artists and biologists, chemists and musicians, philosophers and programmers--against a owning classification who may monopolize what the hacker produces.

Drawing in equivalent degree on man Debord and Gilles Deleuze, A Hacker Manifesto deals a scientific restatement of Marxist suggestion for the age of our on-line world and globalization. within the common insurrection opposed to commodified details, McKenzie Wark sees a utopian promise, past the valuables shape, and a brand new revolutionary category, the hacker classification, who voice a shared curiosity in a brand new details commons.

Show description

Continue reading "Download E-books A Hacker Manifesto PDF"

Download E-books Information Technology Control and Audit, Fourth Edition PDF

By Sandra Senft

The re-creation of a bestseller, Information know-how keep an eye on and Audit, Fourth Edition presents a accomplished and updated review of IT governance, controls, auditing functions, structures improvement, and operations. Aligned to and assisting the keep watch over targets for info and comparable expertise (COBIT), it examines rising developments and defines fresh advances in expertise that effect IT controls and audits―including cloud computing, web-based purposes, and server virtualization.

Filled with routines, evaluate questions, part summaries, and references for extra examining, this up-to-date and revised version promotes the mastery of the thoughts and functional implementation of controls had to deal with info know-how assets successfully good into the long run. Illustrating the total IT audit approach, the text:

  • Considers the felony setting and its effect at the IT field―including IT crime concerns and safeguard opposed to fraud
  • Explains tips to ensure chance administration objectives
  • Covers IT venture administration and describes the auditor’s position within the process
  • Examines complicated subject matters corresponding to digital infrastructure protection, firm source making plans, internet program dangers and controls, and cloud and cellular computing protection
  • Includes overview questions, multiple-choice questions with solutions, workouts, and assets for extra studying in each one chapter

This resource-rich textual content contains appendices with IT audit circumstances, expert criteria, pattern audit courses, bibliography of chosen guides for IT auditors, and a word list. It additionally considers IT auditor profession improvement and making plans and explains how you can identify a profession improvement plan. Mapping the necessities for info structures auditor certification, this article is a perfect source for these getting ready for the qualified details structures Auditor (CISA) and licensed within the Governance of company IT (CGEIT) exams.


Instructor's consultant and PowerPoint® slides on hand upon certified path adoption.

Show description

By Sandra Senft

The re-creation of a bestseller, Information know-how keep an eye on and Audit, Fourth Edition presents a accomplished and updated review of IT governance, controls, auditing functions, structures improvement, and operations. Aligned to and assisting the keep watch over targets for info and comparable expertise (COBIT), it examines rising developments and defines fresh advances in expertise that effect IT controls and audits―including cloud computing, web-based purposes, and server virtualization.

Filled with routines, evaluate questions, part summaries, and references for extra examining, this up-to-date and revised version promotes the mastery of the thoughts and functional implementation of controls had to deal with info know-how assets successfully good into the long run. Illustrating the total IT audit approach, the text:

  • Considers the felony setting and its effect at the IT field―including IT crime concerns and safeguard opposed to fraud
  • Explains tips to ensure chance administration objectives
  • Covers IT venture administration and describes the auditor’s position within the process
  • Examines complicated subject matters corresponding to digital infrastructure protection, firm source making plans, internet program dangers and controls, and cloud and cellular computing protection
  • Includes overview questions, multiple-choice questions with solutions, workouts, and assets for extra studying in each one chapter

This resource-rich textual content contains appendices with IT audit circumstances, expert criteria, pattern audit courses, bibliography of chosen guides for IT auditors, and a word list. It additionally considers IT auditor profession improvement and making plans and explains how you can identify a profession improvement plan. Mapping the necessities for info structures auditor certification, this article is a perfect source for these getting ready for the qualified details structures Auditor (CISA) and licensed within the Governance of company IT (CGEIT) exams.


Instructor's consultant and PowerPoint® slides on hand upon certified path adoption.

Show description

Continue reading "Download E-books Information Technology Control and Audit, Fourth Edition PDF"