Old Search System: information flyer




  • Oreilly - Crap Detection 101: How to Distinguish Good and Bad Information Online

    Oreilly - Crap Detection 101: How to Distinguish Good and Bad Information Online by Howard...


    Today, anyone can create a slick website or a compelling argument via email and find lots of impressionable viewers who will believe every word. In this video, Howard Rheingold offers solid guidelines to help you determine whether the information you come across on the Web is legitimate or whether it's...


  • Oreilly - Nulls, Three-Valued Logic, and Missing Information

    Oreilly - Nulls, Three-Valued Logic, and Missing Information by C.J. Date | Publisher: O'Reilly Media,...


    The logic on which the relational model is based is a two valued logic (2VL). In its attempt to deal with the so called “missing information” problem, however, SQL—more specifically, SQL's support for “nulls”—is based on a three valued logic (3VL) instead. This session explains in detail why any such...


  • Oreilly - Managing Your Information Using Evernote: Gather, Organize, Archive and Share Your Information (Que Video)

    Oreilly - Managing Your Information Using Evernote: Gather, Organize, Archive and Share Your Information (Que...


    Managing Your Information Using Evernote: Gather, Organize, Archive and Share Your Information is an easy-to-understand but comprehensive 5-hour video course that introduces viewers to Evernote and then explains exactly how to use this popular application on a Windows, Mac, iPhone, iPad and/or Android mobile device.DescriptionIn these video lessons, viewers learn...


  • Lynda - Computer Science Principles: Digital Information

    Lynda - Computer Science Principles: Digital Information Computers, at their most basic level, store information...


    Table of ContentsIntroduction1. Innovation and Technology2. Computer Communications3. Number Systems4. Encoding and Sending Text5. Working with Large Amounts of DataConclusion


  • Lynda - CISM Cert Prep: 4 Information Security Incident Management

    Lynda - CISM Cert Prep: 4 Information Security Incident Management Even the best security controls...


    Table of ContentsIntroduction1. Incident Response2. Assessing Incidents3. Incident Response Process4. Incident Symptoms5. Forensic Investigations6. Logging and MonitoringConclusion


  • Lynda - CISM Cert Prep: 3 Information Security Program Development and Management

    Lynda - CISM Cert Prep: 3 Information Security Program Development and Management Prepare to pass...


    Table of ContentsIntroduction1. Information Security Program Development2. Personnel Security3. Data Security Controls4. Cloud Computing and Virtualization5. Host Security6. Mobile Security7. Cryptography8. Physical Security9. Network Security10. Identity and Access Management11. Asset Management12. Personnel Safety13. Software SecurityConclusion


  • Lynda - CISM Cert Prep: 2 Information Risk Management

    Lynda - CISM Cert Prep: 2 Information Risk Management Prepare to pass the Certified Information...


    Table of ContentsIntroduction1. Risk Assessment2. Risk Management3. Malware4. Understanding Attackers5. Attack Types6. Social Engineering Attacks7. Vulnerability Scanning and Penetration Testing8. Awareness and Training9. Business Continuity10. Disaster Recovery11. Supply Chain Risk12. ComplianceConclusion


  • Lynda - CISM Cert Prep: 1 Information Security Governance

    Lynda - CISM Cert Prep: 1 Information Security Governance Prepare for the first domain of...


    Table of ContentsIntroduction1. Information Security Strategy2. Industry Standards3. Security Budgeting4. Security Governance5. Security Policies6. Data Security7. Navigating the Organization8. Assessing Security Programs9. Security PrinciplesConclusion


  • Lynda - CISA Cert Prep: 5 Information Asset Protection for IS Auditors

    Lynda - CISA Cert Prep: 5 Information Asset Protection for IS Auditors Earning a CISA...


    Table of ContentsIntroduction1. Introduction to Information Security2. Security Controls3. Attacks and Countermeasures4. Attestation AuditsConclusion


  • Lynda - CISA Cert Prep: 3 Information Technology Life Cycle for IS Auditors

    Lynda - CISA Cert Prep: 3 Information Technology Life Cycle for IS Auditors Prepare to...


    Table of ContentsIntroduction1. Benefits Realization2. IT Project Management3. Systems Development Life CycleConclusion


  • Lynda - CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors

    Lynda - CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors Earning...


    Table of ContentsIntroduction1. Governance2. Policies, Processes, and Standards3. Risk Management4. IT Management, Structure, and Responsibilities5. Business Continuity and Disaster RecoveryConclusion


  • Lynda - CISA Cert Prep: 1 Auditing Information Systems for IS Auditors

    Lynda - CISA Cert Prep: 1 Auditing Information Systems for IS Auditors Earning a CISA...


    Table of ContentsIntroduction1. IS Audit Management2. IS Internal Controls3. Performing an IS Audit4. Communicating Audit Results5. Control Self-Assessments6. Continuous AuditingConclusion


  • Oreilly - Information Management Maturity: Becoming Data Driven

    Oreilly - Information Management Maturity: Becoming Data Driven by William McKnight | Publisher: Technics Publications...


    Learn how to conduct a data management maturity assessment of your organization. Using a five-tier maturity model, we are going to share with you what the characteristics look like for an organization that is achieving mediocre results all the way to one that is achieving superior results. There are three...


  • Oreilly - Mastering Card Sorting: How to Use Research to Organize Information Intuitively

    Oreilly - Mastering Card Sorting: How to Use Research to Organize Information Intuitively by Elizabeth...


    Keeping a website or app's navigation and information architecture organized is critical to its usability. Users get frustrated when they can't find what they're looking for and a confusing navigation can hide content that you want them to discover. Fortunately, card sorting is an easy-to-learn research method that can guide...


  • Oreilly - Information Architecture Essentials

    Oreilly - Information Architecture Essentials by Jorge Arango | Publisher: O'Reilly Media, Inc. | Release...


    Apprentice yourself to information architecture (IA) master Jorge Arango in this thought-provoking, fast-paced, and thorough examination of what it takes to produce effective UX design. Would-be UX designers will learn how to make information easy to find—and easy to understand—as Arango guides you through the concepts, research and design methods,...


  • Oreilly - A JavaScript Projects AJAX Information Application Exercise

    Oreilly - A JavaScript Projects AJAX Information Application Exercise by Laurence Svekis | Publisher: Packt...


    Explore APIs with JavaScript AJAX to get data from popular web APIs and output it on your web pageAbout This VideoUse JavaScript to connect to popular web APIs and return JSON data and output it to your web pageUse JSON data to build web page contentIn DetailThis course shows you...


  • Deleuze and the Map-Image : Aesthetics, Information, Code, and Digital Art

    Deleuze and the Map-Image : Aesthetics, Information, Code, and Digital Art by Jakub ZdebikEnglish |...


    The map, as it appears in Gilles Deleuze\'s writings, is a concept guiding the exploration of new territories, no matter how abstract. With the advent of new media and digital technologies, contemporary artists have imagined a panoply of new spaces that put Deleuze\'s concept to the test. Deleuze\'s concept of...


  • Animated Information Graphics: An Introduction to Maya 3D

    Animated Information Graphics: An Introduction to Maya 3DEnglish | 1hr 26m | Video: 720p |...


    More info -



  • Cyber Security: The Beginners Guide to Learning The Basics of Information Security

    Cyber Security: The Beginners Guide to Learning The Basics of Information Security English | 2019...





  • Using Information Technology

    Using Information Technology by Brian Williams, Stacey SawyerEnglish | ISBN: 0073516880 | 624 pages |...


    \"The tumultuous changes in the landscape of information technology over the last two years have led us to make extensive modifications in this edition of USING INFORMATION TECHNOLOGY - to do not just a revision but a remaking and reimagining of this computer concepts book.\"
    -Brian K. Williams & Stacey C....