Free Delivery Over $100
1393 books were found.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release... Read More >>
This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions,... Read More >>
This prestigious book is required reading for any student or researcher in (Management) Information Systems, academics... Read More >>
This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores... Read More >>
This book will help IT and business operations managers who have been tasked with addressing security issues. It... Read More >>
This book supplies a blueprint on how to develop effective information security policies and procedures. It uses... Read More >>
Read More >>
The new fifth edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications,... Read More >>
Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design... Read More >>
The book shows how to use Planning by Design (PxD) for developing working models to any type of subject area. Section... Read More >>
This book provides a comprehensive practitioner's view of how SMAC (social, mobile, analytics, and cloud)technologies... Read More >>
Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements... Read More >>
This book shows how systematic strategic planning can be used in real-life cases, regardless of a person's level... Read More >>
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective... Read More >>
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents... Read More >>
This book provides a modern alternative to the fortress approach to security. The new approach is more distributed... Read More >>
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who... Read More >>
This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter... Read More >>
This book provides a comprehensive examination of the various aspects of SDSS evolution, components, architecture,... Read More >>
Provides essential research on the role of Vehicular Ad-Hoc Networks (VANET)-focused communication technologies... Read More >>