See Matches In
Narrow Search Results
Price Range
Brand
Stores
Best Seller | How to Cheat: How to Cheat at Managing Information Security (Paperback) Written for managers responsible for IT/Security departments from mall office environments to enterprise networks this text is designed to cover the basic concepts of security non-technical principle and practices of security and basic information... more | $59.59 $24.97 FREE shipping go to store |
Cyber Security primer for managers (Paperback) This book provides a general overview of cyber security in mostly a non-technical format for those managers who need to get up to speed quickly on protecting their information using best practices more | go to store |
Pre-Owned Information Security Best Practices: 205 Basic Rules (Paperback) 1878707965 9781878707963 Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author s years of experience in computer... more | FREE shipping go to store |
Pre-Owned Roadmap to Information Security: For IT and Infosec Managers Paperback Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in good condition. If you re not completely satisfied please get in touch & we ll be happy to help. ISBN-10: 1435480309 ISBN-13:... more | FREE shipping go to store |
Information Security for Managers (Paperback) The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first hand experience of serious attacks or catastrophic occurrences with... more | $62.38 $52.99 FREE shipping go to store |
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security) jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP) focuses on various state-of-art... more | $177.52 $158.10 FREE shipping go to store |
Research Directions in Data and Applications Security describes original research results and innovative practical developments all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas... more | FREE shipping go to store |
This book constitutes the thoroughly refereed selected papers on Cyber Security and Privacy EU Forum 2013 held in Belgium in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers... more | FREE shipping go to store |
Take on the Street: How to Fight for Your Financial Future (Paperback) In Take on the Street Arthur Levitt--Chairman of the Securities and Exchange Commission for eight years under President Clinton--provides the best kind of insider information: the kind that can help honest small investors protect themselves from the... more | go to store |
This book constitutes the refereed proceedings of the 8th International Workshop on Security IWSEC 2013 held in Okinawa Japan in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63... more | $64.99 $54.99 FREE shipping go to store |
Availability Reliability and Security in Information Systems and Hci: Ifip Wg 8.4 8.9 Tc 5 International Cross-Domain Conference CD-Ares 2013 Regensburg Germany September 2-6 2013 Proceedings more | $109.99 $54.75 FREE shipping go to store |
9780124080560. Pre-Owned: Good condition. Trade paperback. Language: English. Pages: 214. Trade paperback (US). Glued binding. 214 p. Contains: Unspecified Illustrations black & white Figures. Savvy Manager s Guides. Information Management: Gaining... more | $35.65 $30.30 FREE shipping go to store |
Information Security Governance: Framework and Toolset for CISOs and Decision Makers (Paperback) This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity data protection access rights management business continuity... more | $74.95 $59.96 FREE shipping go to store |
Advances in Information Security: Cyber Threat Intelligence (Hardcover) This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware)... more | $149.99 $135.81 FREE shipping go to store |
Advances in Information Security: Intrusion Detection Systems (Paperback) To defend against computer and network attacks multiple complementary security devices such as intrusion detection systems (IDSs) and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious... more | $169.00 $115.46 FREE shipping go to store |
Current thinking about how to improve strategic planning (now upgraded to strategic thinking) and decision making by managers at all levels is to employ some aspect of information systems technology. Although this approach has worked well for most... more | go to store |
Although compliance standards can be helpful guides to writing comprehensive security policies many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001 NIST... more | $89.28 $77.44 FREE shipping go to store |
byMCMogano 1 ACCOUNTANTS 13 BANKS & SECURITIES HOUSES 105 BUSINESS EXPANSION SCHEME FUND MANAGERS 111 FACTORING COMPANIES 119 FINANCE HOUSES 131 INSURANCE COMPANIES 135 INVESTMENT TRUSTS 145 LEASING COMPANIES 159 PUBLIC SECTOR INSTITUTIONS... more | FREE shipping go to store |
Information Security Management Education and Privacy Edited by Yves Deswarte Frédéric Cuppens Sushil Jajodia and Lingyu Wang This volume contains the papers presented at three workshops embedded in the 19th IFIP International Conference on... more | go to store |
Cyber Security : Learn about Cyber Security: Cyber Threats (Paperback) Cyber security refers to the body of technologies processes and practices designed to protect networks devices programs and data from attack damage or unauthorized access. Cyber security may also be referred to as information technology security.... more | go to store |
CHOOSE ANY LEATHER COLOR OF YOUR CHOICE WITHOUT ANY EXTRA CHARGES AND MAIL US YOUR CHOICE. Leather Binding on Spine and Corners with Golden Leaf Printing on round Spine (extra customization on request like complete leather Golden Screen printing in... more | FREE shipping go to store |
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences EuroCybersec 2021 held in Nice France in October 2021. The 9 papers presented together with 1 invited... more | go to store |
Pre-Owned Java Security : Writing and Deploying Secure Applications 9780596001575 Java Security 2nd Edition focuses on the platform features ofJava that provide security--the class loader bytecode verifier and security manager--and recent additions to Java that enhancethis security model: digital signatures security providers... more | $9.54 $8.08 FREE shipping go to store |
Information Technology : Strategic Decision-Making for Managers 9780471652939 Used / Pre-owned CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining... more | $6.06 $4.50 FREE shipping go to store |
Principles of Information Security 9781111138219 Used / Pre-owned The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that... more | $5.47 $4.50 FREE shipping go to store |
Organizations worldwide have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale distributed IT environments security should be proactively planned for... more | FREE shipping go to store |
Guides managers and aspiring managers through implementing a successful coaching and mentoring program both in the workplace and in life. This title includes information on: inspiring self-motivation; coaching versus mentoring; overcoming common... more | FREE shipping go to store |
This book constitutes the refereed proceedings of the Second International Conference ICSP 2021 held in Jamshedpur India in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized... more | FREE shipping go to store |
Pre-Owned Computer and Information Security Handbook 9780123743541 CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining... more | FREE shipping go to store |
Advanced Security and Privacy for RFID Technologies (Hardcover) While there are many positive aspects in which RFID devices are useful there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with... more | FREE shipping go to store |
Write To Influence - Quick Guides for Managers Writing is about more than conveying information. It s about influencing someone to follow directions agree with your position take action or approve your business case. Take what you think you know about writing in your job and turn it on its head.... more | FREE shipping go to store |
Advances in Security Information Management Advances In Security Information Management more | FREE shipping go to store |
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain China June 8-11... more | $106.81 $95.61 FREE shipping go to store |
This book constitutes the proceedings of the 21st International Conference on Information Security ISC 2018 held in Guildford UK in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions.... more | $72.20 $65.52 FREE shipping go to store |
Intended for business students and managers who want to become more customer-oriented this book focuses on helping managers develop information skills for understanding customers perceptions of value and satisfaction. more | $6.67 $5.84 FREE shipping go to store |
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also you will learn what you need... more | $16.98 $9.99 go to store |
This bestselling self-study guide fully prepares candidates for the challenging Certified Information Systems Security Professional exam and offers 100% coverage of all eight exam domains. This edition has been thoroughly revised to cover the new... more | FREE shipping go to store |
One of the nation s most respected financial advisers presents a guide to shows readers how to take advantage of the exciting financial opportunities of the 21st century. He also offers in-depth information on tomorrow s financial trends. more | FREE shipping go to store |
Ads related to information security for managers