Filter
Datorsäkerhet
Filter
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its …
IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this book will explore the different …
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data …
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to …
The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores …
This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of …
Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the …
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively managed to remain relevant and successful in a dynamic operating …
Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching …
Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regulatory requirements, the onslaught of breaches, as well as …