Information Systems: What Every Business Student Needs to Know (Chapman & Hall/CRC Textbooks in Computing)

Rating: 
Amazon Price: N/A (as of April 20, 2018 07:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. Information Systems: What Every Business Student Needs to Know takes a new approach to the required information systems course for business majors.

For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students once they are on the job. Review questions, discussion questions, and summaries are also included in each chapter to reinforce learning. The book is presented in four parts:
Continue reading “Information Systems: What Every Business Student Needs to Know (Chapman & Hall/CRC Textbooks in Computing)”

Intelligence-Based Security in Private Industry

Rating: 
Amazon Price: N/A (as of May 12, 2016 00:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to reduce private businesses’ risk and vulnerability to criminal activities.

This book is practical and informational, demonstrating real applications of the concepts, theories, and methods of gathering and acting upon information that may suggest a threat to a company. It explains the difference between risk assessments, vulnerability assessments, and threat assessments, defines external and internal threats, and outlines how strategies to address either form of threat differ. It also establishes an outline of four key parts to an effective intelligence program: assessment, evaluation, analysis, and mitigation.
Continue reading “Intelligence-Based Security in Private Industry”

Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Rating: 
Amazon Price: $15.95 $14.81 You save: $1.14 (7%). (as of April 19, 2018 11:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defense secrets from governments.

While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the late 1990s, the Queen herself had declared safe e-commerce a national security priority. Agents from the London-based National Hi-Tech Crime Unit sought out Barrett and enlisted his help. They also sent detective Andrew Crocker, a Welsh former boxer, to Russia to track down and prosecute the hackers—and to find out who they worked for.
Continue reading “Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet”

Enterprise Cyber Security: Second Edition

Rating: 
Amazon Price: $78.98 $77.59 You save: $1.39 (2%). (as of April 20, 2018 07:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Enterprise Cyber Security presents the basic knowledge of cyber security in a succinct manner. Both theoretical and practical aspects are covered. Topic areas in the book provide knowledge needed to understand how confidentiality, integrity and availability of information can be assured. Key features: *Cyber security concepts introduced without technical jargon *Both theoretical and practical aspects are covered *Provides a balanced view of cyber security *Appeals to students, professionals and enthusiasts

Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Rating: 
Amazon Price: N/A (as of June 21, 2017 17:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Want to join the technological revolution that’s taking the world of finance by storm? Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the requisite knowledge to help you participate in the internet of money. Whether you’re building the next killer app, investing in a startup, or simply curious about the technology, this practical book is essential reading.

Bitcoin, the first successful decentralized digital currency, is still in its infancy and it’s already spawned a multi-billion dollar global economy. This economy is open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides you with the knowledge you need (passion not included).
Continue reading “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”