![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Network security
While many police officers undertake their work conforming to the highest ethical standards, the fact remains that unethical police conduct continues to be a recurring problem around the world. With examples from a range of jurisdictions, Police Corruption: Preventing Misconduct and Maintaining Integrity examines the causes of police misconduct and explores applied strategies designed to maximize ethical conduct and identify and prevent corruption. Analyzes the roots of corruption Introducing the phenomenon of police officer misconduct, the book provides an analysis of unethical behavior, its effects, and different causal factors. The author examines the impact on the community and the police themselves, the dilemma of establishing universal ethical principles, and ways of identifying and measuring misconduct problems. The remainder of the text examines applied strategies designed to maximize ethical conduct and prevent corruption. A myriad of proven strategies Exploring a wide range of approaches, the book discusses best practices in the recruitment of ethical applicants, strategies for dealing with misconduct, risk reduction strategies and early warning and intervention systems, along with advanced strategies such as drug and alcohol testing, integrity tests, and the use of covert surveillance. The text also explores the role of independent external oversight bodies that audit police strategies and conduct their own investigation. The final chapter on ethical leadership emphasizes the need to go beyond a checklist of rules with leadership that values, requires, and models integrity in all aspects of police work. Examples from around the world Taking a global approach, this volume recognizes that policing is prone to the same potential problems of corruption and misconduct everywhere in the world. Highlighting
Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity-including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the mos
Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics to maintain order and stay in power. State Fragility Around the World: Fractured Justice and Fierce Reprisal analyzes the path to state failure, one manifestation of which appears through the fragility and dysfunction of its criminal justice system. This book examines what happens when a government loses the ability, or will, to provide basic goods and services to its constituents. Acknowledging the tremendous variability of failed and fragile states, the case studies and analyses contained in this book suggest the existence of functional and structural attributes common across most state systems. The authors explore the plights of various states in which key elements related to their criminal justice systems are weak or fragile. States under examination include Mexico, Afghanistan, Iran, Syria, and Georgia. Special attention is given to Somalia, Sudan, and South Sudan, which serve as examples of what happens to a state that fails in virtually all aspects of governance. Using a unique approach, State Fragility Around the World articulates a specific method for assessing relative state fragility. Using this method, natural groupings of relative fragility and stability evolve, providing an unprecedented way to compare social phenomena and functionality across national and regional borders. Readers will also gain a deeper understanding of what it means to be a fragile state as well as how state fragility affects core freedoms, the criminal justice process, and mechanisms of punishment.
Offering carefully curated articles from the European Association of Psychology and Law (EAPL), this book features chapters from a truly international group of scholars. This text is the first of its kind to offer insights into current developments in psychology and law in Russia. The field of psychology and law has a very long and strong tradition in Russia, but very little is known, as Russian scholars rarely publish their works in English. The volume also contains state-of-the-art chapters on topics at the very core of psychology and law, including offender profiling, lie detection, crime linking, false memories, and witness interviewing. Features Provides rare insight into Russian history of forensic and criminal psychology Covers core topics in the discipline Offers international scope from a diverse array of contributors Psychology and Law in Europe: When West Meets East is a text of interest for students of psychology, law, or criminal justice, as well as scholars and practitioners in the field. This text offers a window into global advances in psychology and law.
This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge. The book offers clear explanations of every subject on the CCSP exam and features accurate practice questions and real-world examples. New, updated, or expanded coverage includes cloud data security, DevOps security, mobile computing, threat modeling paradigms, regulatory and legal frameworks, and best practices and standards. Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. Special design elements throughout provide insight and call out potentially harmful situations. All practice questions match the tone, content, and format of those on the actual exam Includes access to 300 practice questions in the TotalTester (TM) Online customizable test engine Written by an IT security expert and experienced author
This volume explores from a legal perspective, how blockchain works. Perhaps more than ever before, this new technology requires us to take a multidisciplinary approach. The contributing authors, which include distinguished academics, public officials from important national authorities, and market operators, discuss and demonstrate how this technology can be a driver of innovation and yield positive effects in our societies, legal systems and economic/financial system. In particular, they present critical analyses of the potential benefits and legal risks of distributed ledger technology, while also assessing the opportunities offered by blockchain, and possible modes of regulating it. Accordingly, the discussions chiefly focus on the law and governance of blockchain, and thus on the paradigm shift that this technology can bring about.
In terms of raw numbers, the amount of world urban dwellers have increased four-fold, skyrocketing from 740 million in 1950 to almost 3.3 billion in 2007. This ongoing urbanization will continue to create major security challenges in most countries. Based on contributions from academics and practitioners from countries as diverse as Nigeria, Pakistan, Azerbaijan, and the US, Urbanization, Policing, and Security: Global Perspectives highlights the crime and disorder problems associated with urbanization and demonstrates police and private security responses to those problems. Examines responses to urban problems The book draws on the practical experiences of police officials and the academic insights of researchers from around the world to detail the consequences of urbanization - crime, terrorism, disorder, drugs, traffic crashes - as well as modern responses to those problems. Covering studies on major cities in more than 18 countries, this text explores topics such as the role of urbanization in security and global concerns including transnational crime, racial profiling, and information sharing. The book also examines responses to urban problems associated with police and security, including human rights activism and police reform. The tools to devise sophisticated solutions The problems confronting policing in these times are quite daunting, providing plenty of challenges for police leaders and requiring them to devise increasingly sophisticated solutions. With more than 100 photos and illustrations, the book tackles issues from a different angle. It examines the resources required to solve problems and those necessary to build a knowledge base of policing and the professionalism for police forces.
The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large. Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including: Western attempts to reform the policing of sex tourists in the Philippines and Gambia Policing the flow of people and goods in the port of Rotterdam Policing protestors and what happened at the 2010 G20 Summit in Toronto Mexico's use of the military in its war against drug trafficking Public-private cooperation in the fight against organized crime and terrorism in Australia Recommendations for police reform in Afghanistan Sweden's national counterterrorism unit Treatment of asylum seekers in a privately run detention center in South Africa The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.
"This book is the encyclopedia of phishing. It provides views from
the payment, human, and technical perspectives. The material is
remarkably readable--each chapter is contributed by an expert on
that topic, but none require specialized background on the part of
the reader. The text will be useful for any professional who seeks
to understand phishing." Phishing attacks, or the practice of deceiving people into revealing sensitive data on a computer system, continue to mount. Here is the information you need to understand how phishing works, how to detect it, and how to prevent it. "Phishing and Countermeasures" begins with a technical introduction to the problem, setting forth the tools and techniques that phishers use, along with current security technology and countermeasures that are used to thwart them. Readers are not only introduced to current techniques of phishing, but also to emerging and future threats and the countermeasures that will be needed to stop them. The potential and limitations of all countermeasures presented in the text are explored in detail. In spite of the fact that phishing attacks constantly evolve, much of the material in this book will remain valid, given that the book covers the general principles as much as actual instances of phishing. While delving into a myriad of countermeasures and defense strategies, the authors also focus on the role of the user in preventing phishing attacks. The authors assert that countermeasures often fail not for technical reasons, but rather because users are unable or unwilling to use them. In response, the authors present a number ofcountermeasures that are simple for users to implement, or that can be activated without a user's direct participation. Moreover, the authors propose strategies for educating users. The text concludes with a discussion of how researchers and security professionals can ethically and legally perform phishing experiments to test the effectiveness of their defense strategies against the strength of current and future attacks. Each chapter of the book features an extensive bibliography to help readers explore individual topics in greater depth. With phishing becoming an ever-growing threat, the strategies presented in this text are vital for technical managers, engineers, and security professionals tasked with protecting users from unwittingly giving out sensitive data. It is also recommended as a textbook for students in computer science and informatics.
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
The Ultimate Tool for MINDSTORMS(r) Maniacs
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase, continuing this sharp focus into security design, secured programming, security testing, and secured deployment. Outlines Protection Protocols for Numerous Applications Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers, engineers, and architects to approach security in a holistic fashion at the beginning of the software development li
If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate? Would your staff? Would every person who works for your organization? Increasing threats to business operations, both natural and man-made, mean a disaster could occur at any time. It is essential that corporations and institutions develop plans to ensure the preservation of business operations and the technology that supports them should risks become reality. Building an Enterprise-Wide Business Continuity Program goes beyond theory to provide planners with actual tools needed to build a continuity program in any enterprise. Drawing on over two decades of experience creating continuity plans and exercising them in real recoveries, including 9/11 and Hurricane Katrina, Master Business Continuity Planner, Kelley Okolita, provides guidance on each step of the process. She details how to validate the plan and supplies time-tested tips for keeping the plan action-ready over the course of time. Disasters can happen anywhere, anytime, and for any number of reasons. However, by proactively planning for such events, smart leaders can prepare their organizations to minimize tragic consequences and readily restore order with confidence in the face of such adversity.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book provides essential insight and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.
Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results-they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seven parts, the book provides in-depth coverage of the most novel reference scenarios for privacy-preserving techniques. The first part gives general techniques that can be applied to various applications discussed in the rest of the book. The second section focuses on the sanitization of network traces and privacy in data stream mining. After the third part on privacy in spatio-temporal data mining and mobility data analysis, the book examines time series analysis in the fourth section, explaining how a perturbation method and a segment-based method can tackle privacy issues of time series data. The fifth section on biomedical data addresses genomic data as well as the problem of privacy-aware information sharing of health data. In the sixth section on web applications, the book deals with query log mining and web recommender systems. The final part on social networks analyzes privacy issues related to the management of social network data under different perspectives. While several new results have recently occurred in the privacy, database, and data mining research communities, a uniform presentation of up-to-date techniques and applications is lacking. Filling this void, Privacy-Aware Knowledge Discovery presents novel algorithms, patterns, and models, along with a significant collection of open problems for future investigation.
Recognized as a "Recommended" title by Choice for their November 2020 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Presenting a fundamental definition of resilience, the book examines the concept of resilience as it relates to space system design. The book establishes the required definitions, relates its place to existing state-of-the-art systems engineering practices, and explains the process and mathematical tools used to achieve a resilient design. It discusses a variety of potential threats and their impact upon a space system. By providing multiple, real-world examples to illustrate the application of the design methodology, the book covers the necessary techniques and tools, while guiding the reader through the entirety of the process. The book begins with space systems basics to ensure the reader is versed in the functions and components of the system prior to diving into the details of resilience. However, the text does not assume that the reader has an extensive background in the subject matter of resilience. This book is aimed at engineers and architects in the areas of aerospace, space systems, and space communications.
This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology
The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely focus on RDS in finance and economics. Exploring this emerging area, Random Dynamical Systems in Finance shows how to model RDS in financial applications. Through numerous examples, the book explains how the theory of RDS can describe the asymptotic and qualitative behavior of systems of random and stochastic differential/difference equations in terms of stability, invariant manifolds, and attractors. The authors present many models of RDS and develop techniques for implementing RDS as approximations to financial models and option pricing formulas. For example, they approximate geometric Markov renewal processes in ergodic, merged, double-averaged, diffusion, normal deviation, and Poisson cases and apply the obtained results to option pricing formulas. With references at the end of each chapter, this book provides a variety of RDS for approximating financial models, presents numerous option pricing formulas for these models, and studies the stability and optimal control of RDS. The book is useful for researchers, academics, and graduate students in RDS and mathematical finance as well as practitioners working in the financial industry.
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance for the design and implementation of an efficient operational risk management system. It contains all elements of assessment, including operational risk identification, measurement, modeling, and monitoring analysis, along with evaluation analysis and the estimation of capital requirements. The authors also address the managing and controlling of operational risks including operational risk profiling, risk optimization, cost & optimal resource allocation, decision-making, and design of optimal risk policies. Divided into four parts, this book begins by introducing the idea of operational risks and how they affect financial organizations. This section also focuses on the main aspects of managing operational risks. The second part focuses on the requirements of an operational risk management framework according to the Basel II Accord. The third part focuses on all stages of operational risk assessment, and the fourth part focuses on the control and management stages. All of these stages combine to implement efficient and optimal operational risk management systems.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Principles and Best Practices: Beyond Compliance integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with FISMA requirements. Based on the author's experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, including the U.S. Department of Housing and Urban Development, the book gives you workable solutions for establishing and operating an effective security compliance program. It delineates the processes, practices, and principles involved in managing the complexities of FISMA compliance. Describing how FISMA can be used to form the basis for an enterprise security risk management program, the book: Provides a comprehensive analysis of FISMA requirements Highlights the primary considerations for establishing an effective security compliance program Illustrates successful implementation of FISMA requirements with numerous case studies Clarifying exactly what it takes to gain and maintain FISMA compliance, Pat Howard, CISO of the Nuclear Regulatory Commission, provides detailed guidelines so you can design and staff a compliance capability, build organizational relationships, gain management support, and integrate compliance into the system development life cycle. While there is no such thing as absolute protection, this up-to-date resource reflects th
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- Focuses on setting the right road map so that you can be most effective in your information security implementations Discusses cost-effective staffing, the single biggest expense to the security organization Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively Identifies high-risk areas, focusing limited resources on the most imminent and severe threats Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.
An organization's employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud. Drawing from the author's vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. |
![]() ![]() You may like...
Cloud Security - Concepts…
Information Reso Management Association
Hardcover
R9,945
Discovery Miles 99 450
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee
Paperback
R1,859
Discovery Miles 18 590
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R8,595
Discovery Miles 85 950
|