High-Priority Asset


Book Description

To safeguard California’s Witness Protection Program, recovering leaked information is the top priority. The safety of every person in California’s Witness Protection Program rests in US marshal Dutch Haas’s capable hands. So inserting himself into Isabel Vargas’s life to get the drop on her criminal uncle is a no-brainer. Except his target is fiery and intelligent—and she quickly becomes his partner instead of his mark. With threats stacking up, will Isabel and Dutch be able to stop Isabel’s past from catching up with her before it is too late?













Uptime


Book Description

Uptime describes the combination of activities that deliver fewer breakdowns, improved productive capacity, lower costs, and better environmental performance. The bestselling second edition of Uptime has been used as a textbook on maintenance management in several postsecondary institutions and by many companies as the model framework for their mai




Information Assurance Architecture


Book Description

Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow. By studying this book, readers will acquire the skills necessary to develop a security architecture that serves specific needs. They will come to understand distinctions amongst engineering architecture, solutions architecture, and systems engineering. The book also shows how the Zachman and the Federal Enterprise Architecture models can be used together to achieve the goals of a business or government agency.







Future Data and Security Engineering


Book Description

This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27 revised full papers and 2 short papers presented were carefully reviewed and selected from 115 submissions. They have been organized in the following topical sections: Big Data Analytics and Cloud Data Management; Internet of Things and Applications; Security and Privacy Engineering; Data Protection and Data Hiding; Advances in Authentication and Data Access Control; Access Control in NoSQL and Big Data; Context-based Data Analysis and Applications; Emerging Data Management Systems and Applications.







Accounting Information Systems


Book Description