0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (119)
  • R250 - R500 (429)
  • R500+ (1,350)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Feminism, Writing and the Media in Spain - Ana Maria Matute, Rosa Montero and Lucia Etxebarria (Paperback, New edition): Mazal... Feminism, Writing and the Media in Spain - Ana Maria Matute, Rosa Montero and Lucia Etxebarria (Paperback, New edition)
Mazal Oaknin
R1,436 Discovery Miles 14 360 Ships in 10 - 15 working days

This book explores the different treatment of writing by women and writing by men in twenty-first-century Spain. Focusing on contemporary Spanish authors Ana Maria Matute (1926-2014), Rosa Montero (1952-), and Lucia Etxebarria (1966-), the author examines how Spanish women writers are marketed in Spain and, in particular, how current marketing strategies reinforce traditional structures of femininity. Through an analysis of their work and lives in the context of the Franco Regime, the Transition to democracy and contemporary Spain, this book provides an innovative study of the construction of the public personae of these key female writers. As social media and the internet transform authors' relationship with their readers, the rapidly shifting publishing industry offers an important context for the difficult balance between high levels of reception and visibility and the persistence of traditional gender stereotypes.

Multilayer Networks - Structure and Function (Paperback): Ginestra Bianconi Multilayer Networks - Structure and Function (Paperback)
Ginestra Bianconi
R1,163 Discovery Miles 11 630 Ships in 9 - 17 working days

Multilayer networks is a rising topic in Network Science which characterizes the structure and the function of complex systems formed by several interacting networks. Multilayer networks research has been propelled forward by the wide realm of applications in social, biological and infrastructure networks and the large availability of network data, as well as by the significance of recent results, which have produced important advances in this rapidly growing field. This book presents a comprehensive account of this emerging field. It provides a theoretical introduction to the main results of multilayer network science.

Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality (Hardcover): Emilia Simao, Celia Soares Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality (Hardcover)
Emilia Simao, Celia Soares
R4,603 Discovery Miles 46 030 Ships in 18 - 22 working days

The concept of immersive multimedia, which is closely related to concepts of augmented reality, brings opportunities in art, education, entertainment, and technology. As such, it is vital to explore the connections between consumers of media content and information parts that come from multimedia platforms. Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality is a critical scholarly resource that offers solutions to the problems that appear in both theoretical and practical dimensions of immersive multimedia experiences on an interdisciplinary platform. Featuring coverage on a broad range of topics such as cyber behavior, human-computer interaction, and transmedia, this book is geared towards digital artists, media professionals, developers, academicians, researchers, and upper-level graduate students seeking current research on the exploration of immersive multimedia through the perspectives of technology, communications, and art.

Digital Storytelling - Form and Content (Hardcover, 1st ed. 2017): Mark Dunford, Tricia Jenkins Digital Storytelling - Form and Content (Hardcover, 1st ed. 2017)
Mark Dunford, Tricia Jenkins
R3,722 Discovery Miles 37 220 Ships in 9 - 17 working days

This edited collection brings together academics and practitioners to explore the uses of Digital Storytelling, which places the greatest possible emphasis on the voice of the storyteller. Case studies are used as a platform to investigate questions of concept, theory and practice, and to shine an interrogative light on this emergent form of participatory media. The collection examines the creative and academic roots of Digital Storytelling before drawing on a range of international examples to consider the way in which the practice has established itself and evolved in different settings across the world.

The Dictionary of Multimedia 1999 - Terms and Acronyms (Hardcover, 2nd edition): Brad Hansen The Dictionary of Multimedia 1999 - Terms and Acronyms (Hardcover, 2nd edition)
Brad Hansen
R3,554 Discovery Miles 35 540 Ships in 10 - 15 working days

Multimedia, which may be defined as interactive digital media, is a synthesis of traditional forms of art and communication with the rapidly-evolving fields of computing and networking. A variety of technical and social/cultural disciplines are involved: audio, graphic, hardware, human factors, networking, software, telecommunications, and video. A large and often incomprehensible vocabulary has resulted from the convergence of these diverse disciplines.

Comprehensive, concise and clearly written, The Dictionary of Multimedia presents and defines the "language" that has resulted from this convergence -- from A: B: C notation to z-sorting. Industry-standard acronyms are also spelled out and defined. Extended definitions of important concepts such as MIDI Fire Wire, and MPEG are included.

Features of the new Second Edition include: more than 4,000 terms (50% more than in the 1998 edition); additional illustrations and graphic examples; in-depth treatment of Internet technologies: XML, HTML 4.0, JavaScript; new standards: MPEG-2 and other video codecs, DVD, VRML, Dolby Audio; new bus architectures and operating systems; updated treatment of the latest hardware; JAVA programming references; etc.

100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback): Nick Vandome 100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback)
Nick Vandome
R161 Discovery Miles 1 610 Ships in 10 - 15 working days
CyberBRICS - Cybersecurity Regulations in the BRICS Countries (Hardcover, 1st ed. 2021): Luca Belli CyberBRICS - Cybersecurity Regulations in the BRICS Countries (Hardcover, 1st ed. 2021)
Luca Belli
R3,673 Discovery Miles 36 730 Ships in 10 - 15 working days

This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries - namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense. The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.

Australian Feminist Campaigning - Celanthropy, Online Activism and Celebrity Feminism (Hardcover, New edition): Sarah Casey Australian Feminist Campaigning - Celanthropy, Online Activism and Celebrity Feminism (Hardcover, New edition)
Sarah Casey
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days
Young People, Social Media and Health (Hardcover): Victoria Goodyear, Kathleen Armour Young People, Social Media and Health (Hardcover)
Victoria Goodyear, Kathleen Armour
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

The book is relevant for various regions including the US, UK, Australia, Western European nations and New Zealand. Key informants offer insights for policy and practice. Rich theoretical analysis further contextualizes findings and provides analysis to advance the field.

Electronic Word of Mouth as a Promotional Technique - New Insights from Social Media (Hardcover): Shu-Chuan Chu, Juran Kim,... Electronic Word of Mouth as a Promotional Technique - New Insights from Social Media (Hardcover)
Shu-Chuan Chu, Juran Kim, Charles R Taylor
R4,490 Discovery Miles 44 900 Ships in 10 - 15 working days

Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.

Intellectual Property Rights and Emerging Technology - 3D Printing in China (Hardcover): Hing Kai Chan, Hui Leng Choo, Onyeka... Intellectual Property Rights and Emerging Technology - 3D Printing in China (Hardcover)
Hing Kai Chan, Hui Leng Choo, Onyeka Osuji, James Griffin
R4,488 Discovery Miles 44 880 Ships in 10 - 15 working days

3D printing poses many challenges to the traditional law of intellectual property (IP). This book develops a technical method to help overcome some of these legal challenges and difficulties. This is a collection of materials from empirical interviews, workshops and publications that have been carried out in one of the world's leading research projects into the legal impact of 3D printing. The project was designed to establish what legal challenges 3D printing companies thought they faced, and having done that, to establish a technical framework for a solution.

Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover): Amanda Lagerkvist Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover)
Amanda Lagerkvist; Foreword by John Durham Peters
R4,507 Discovery Miles 45 070 Ships in 10 - 15 working days

Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.

Handbook of Research on Effective Advertising Strategies in the Social Media Age (Hardcover): Nurdan OEncel Taskiran, Recep... Handbook of Research on Effective Advertising Strategies in the Social Media Age (Hardcover)
Nurdan OEncel Taskiran, Recep Yilmaz
R8,363 Discovery Miles 83 630 Ships in 18 - 22 working days

Social media pervades people's awareness and everyday lives while also influencing societal and cultural patterns. In response to the social media age, advertising agents are creating new strategies that best suit changing consumer relationships. The Handbook of Research on Effective Advertising Strategies in the Social Media Age focuses on the radically evolving field of advertising within the new media environment. Covering new strategies, structural transformation of media, and changing advertising ethics, this book is a timely publication for policymakers, government officials, academicians, researchers, and school practitioners interested in furthering their research exposure and analyzing the rapidly evolving advertising sector and its reflection on social media.

Intellectual Property in Consumer Electronics, Software and Technology Startups (Hardcover, 2014 ed.): Gerald B. Halt, Jr.,... Intellectual Property in Consumer Electronics, Software and Technology Startups (Hardcover, 2014 ed.)
Gerald B. Halt, Jr., John C. Donch, Jr., Amber R. Stiles, Robert Fesnak
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book provides a comprehensive guide to procuring, utilizing and monetizing intellectual property rights, tailored for readers in the high-tech consumer electronics and software industries, as well as technology startups. Numerous, real examples, case studies and scenarios are incorporated throughout the book to illustrate the topics discussed. Readers will learn what to consider throughout the various creative phases of a product's lifespan from initial research and development initiatives through post-production. Readers will gain an understanding of the intellectual property protections afforded to U.S. corporations, methods to pro-actively reduce potential problems, and guidelines for future considerations to reduce legal spending, prevent IP theft, and allow for greater profitability from corporate innovation and inventiveness.

Evolutionary Psychology and Digital Games - Digital Hunter-Gatherers (Hardcover): Johannes Breuer, Daniel Pietschmann, Benny... Evolutionary Psychology and Digital Games - Digital Hunter-Gatherers (Hardcover)
Johannes Breuer, Daniel Pietschmann, Benny Liebold, Benjamin P. Lange
R4,492 Discovery Miles 44 920 Ships in 10 - 15 working days

Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R5,053 Discovery Miles 50 530 Ships in 10 - 15 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

See Ya Later - The World According to Arron Crascall (Paperback): Arron Crascall See Ya Later - The World According to Arron Crascall (Paperback)
Arron Crascall 1
R233 R213 Discovery Miles 2 130 Save R20 (9%) Ships in 9 - 17 working days

Alright guys? It's me, Arron. Or as some people call me, 'that guy with the phone, the skinny jeans and the really fat head on Facebook'. In a world that seems to be freefalling without a parachute towards utter chaos, I'm here to remind you that when life gives you lemons, make lemonade. No, in fact, when life gives you lemons, make a fool out of yourself in the lemonade aisle.* Because there's more to life than Brexit, Bake Off and banging on about being vegan. Yes, with this book - which is my take on the world - you will learn how to survive a proper lads' holiday, become a master in the art of takeaway ordering and find out about the pitfalls of seriously inappropriate tattoos. So do yourself a favour: turn off the news, cancel that juice cleanse, open your eyes to the brilliant, hilarious world we live in and most importantly . . . buy this book. SEE YA LATER! Arron x *Actually, don't do exactly that, that's my thing.

Personal Style Blogs - Appearances that Fascinate (Paperback): Rosie Findlay Personal Style Blogs - Appearances that Fascinate (Paperback)
Rosie Findlay
R848 Discovery Miles 8 480 Ships in 10 - 15 working days

From Style Rookie to Style Bubble, personal style blogs exploded onto the scene in the mid-2000s giving voice to young and stylish writers who had their own unique take on the seasonal fashion cycle and how to curate an individual style within the shifting swirl of trends. Personal Style Blogs examines the history and rise of style blogging and looks closely at the relationship between bloggers and their (often anonymous) readers as well as the response of the fashion industry to style bloggers' amateur and often unauthorized fashion reportage. The book charts the development of the style blogosphere and its transformation from an alternative, experimental space to one dominated by the fashion industry. Complete with examples of several famous fashion bloggers, such as Susie Lau, Rumi Neely and Tavi Gevinson, the author explores notions of individuality, aesthetics and performance on both sides of the digital platform. Findlay asks: what can style blogging teach us about women's writing and the performance of a private self online? And what drives style bloggers to carve a space for themselves online?

Software Test Attacks to Break Mobile and Embedded Devices (Hardcover): Jon Duncan Hagar Software Test Attacks to Break Mobile and Embedded Devices (Hardcover)
Jon Duncan Hagar
R5,505 Discovery Miles 55 050 Ships in 10 - 15 working days

Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.

Information Security Management Handbook - Volume IV (Hardcover): Harold Tipton Information Security Management Handbook - Volume IV (Hardcover)
Harold Tipton
R12,082 Discovery Miles 120 820 Ships in 10 - 15 working days

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R5,084 Discovery Miles 50 840 Ships in 10 - 15 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

Technocrime and Criminological Theory (Hardcover): Kevin Steinmetz, Matt R. Nobles Technocrime and Criminological Theory (Hardcover)
Kevin Steinmetz, Matt R. Nobles
R6,749 Discovery Miles 67 490 Ships in 10 - 15 working days

Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover): Thomas R.... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R5,215 Discovery Miles 52 150 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Security for Service Oriented Architectures (Hardcover): Walter Williams Security for Service Oriented Architectures (Hardcover)
Walter Williams
R5,359 Discovery Miles 53 590 Ships in 10 - 15 working days

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.

Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover): Ann Butera Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover)
Ann Butera
R5,764 Discovery Miles 57 640 Ships in 10 - 15 working days

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Anthology on Applying Social…
Information R Management Association Hardcover R8,997 Discovery Miles 89 970
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R221 Discovery Miles 2 210
Research Anthology on Social Media's…
Information Resources Management Association Hardcover R9,426 Discovery Miles 94 260
Coaching Manual, The
Julie Starr Paperback R461 Discovery Miles 4 610
The Creator Revolution - How Today's…
Catherine Yeo Hardcover R680 R609 Discovery Miles 6 090
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak Paperback R2,634 Discovery Miles 26 340
Ready, Set, Growth hack - A beginners…
Nader Sabry Hardcover R676 R605 Discovery Miles 6 050
Research Anthology on Strategies for…
Information R Management Association Hardcover R13,719 Discovery Miles 137 190
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R380 R357 Discovery Miles 3 570

 

Partners