Sökt på: Sökresultat
totalt 17 träffar
Radical Reporting
Most people dread writing reports; they also dread reading reports. What they don’t realize is that the techniques that make writing more readable make it more powerful. This is …
The Complete Guide to Cybersecurity Risks and Controls
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you …
Rising from the Mailroom to the Boardroom
Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial …
Modern Management and Leadership
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be …
The Cybersecurity Body of Knowledge
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion …
Say What!? Communicate with Tact and Impact
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting).Intended for …
The Security Hippie
The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable …
The Auditor’s Guide to Blockchain Technology
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its …
Mind the Tech Gap
IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this book will explore the different …
Controlling Privacy and the Use of Data Assets - Volume 1
"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, …
The CISO Journey
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically …
Artificial Intelligence Perspective for Smart Cities
The concept of a "smart city" is used widely in general; however, it is hard to explain because of the complexity and multidimensionality of this notion. However, the essential …