EXECUTIVE'S GUIDE TO CYBER RISK : SECURING THE FUTURE TODAY
| Main Author: | Moyo, Siedfried (Author) |
|---|---|
| Format: | Book |
| Published: |
New Jersey :
John Wiley & Sons, Inc
[2022]
|
| Subjects: |
Similar Items
Cyber Intelligence-Driven Risk : How to Build and Use Cyber Intelligence for Business Risk Decisions
by: Moore, Richard O. III
Published: (2021)
by: Moore, Richard O. III
Published: (2021)
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005)
by: McClure, Stuart
Published: (2005)
Cyber security culture : counteracting cyber threats through organizational learning and training
by: Trim, Peter R.J
Published: (2013)
by: Trim, Peter R.J
Published: (2013)
Data-driven security
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Information technology security
Published: (2006)
Published: (2006)
Security risk management : building an information security risk management program from the ground up
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
Anti-hacker tool kit
by: Shema,Mike
Published: (2014)
by: Shema,Mike
Published: (2014)
Anti-Hacker tool kit
by: Jones, Keith J.
Published: (2002)
by: Jones, Keith J.
Published: (2002)
Cyberphobia : identity, trust, security and the internet
by: Lucas, Edward
Published: (2015)
by: Lucas, Edward
Published: (2015)
Kisah benar cyber 999 : kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
CLOUD SECURITY : A GENERAL GUIDE TO SECURED COMPUTING
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
Auditing cloud computing : a security and privacy guide
Published: (2011)
Published: (2011)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
STEAM JOBS IN CYBER-SECURITY
by: Argentine, Cynthia
Published: (2020)
by: Argentine, Cynthia
Published: (2020)
Security strategy : from requirements to reality
by: Stackpole, Bill
Published: (2011)
by: Stackpole, Bill
Published: (2011)
IT governance
by: Calder, Alan
Published: (2012)
by: Calder, Alan
Published: (2012)
Privacy and digital security
by: Fromm, Megan
Published: (2015)
by: Fromm, Megan
Published: (2015)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
CYBER MAYDAY AND THE DAY AFTER : A LEADER'S GUIDE TO PREPARING, MANAGING, AND RECOVERING FROM INEVITABLE BUSINESS DISRUPTIONS
by: Lohrmann, Dan, et al.
Published: (2022)
by: Lohrmann, Dan, et al.
Published: (2022)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Future crimes : everything is connected everyone is vulnerable and what we can do about it
by: Goodman, Marc
Published: (2015)
by: Goodman, Marc
Published: (2015)
Designing and building a security operations center
by: Nathans, David
Published: (2015)
by: Nathans, David
Published: (2015)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
Cybersecurity for dummies
by: Steinberg, Joseph
Published: (2022)
by: Steinberg, Joseph
Published: (2022)
Teknik wireless hacking dan cara pembendungannya
by: Efzy Zam
by: Efzy Zam
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
Is it safe? : protecting your computer,your business and yourself online
by: Miller, Michael
Published: (2008)
by: Miller, Michael
Published: (2008)
Network security architectures
by: Convery, Sean
Published: (2004)
by: Convery, Sean
Published: (2004)
INSIDE JOBs : WHY INSIDER RISK IS THE BIGGEST CYBER THREAT YOU CAN'T IGNORE
by: Payne, Joe, et al.
Published: (2020)
by: Payne, Joe, et al.
Published: (2020)
Principles of information security
by: Whitman, Michael E.
Published: (2003)
by: Whitman, Michael E.
Published: (2003)
The complete reference : Information security
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Managing cybersecurity resources : a cost-benefit analysis
by: Gordon, Lawrence A.
Published: (2006)
by: Gordon, Lawrence A.
Published: (2006)
Securing E-Business applications and communications
by: Held, Jonathan S.
Published: (2001)
by: Held, Jonathan S.
Published: (2001)
Similar Items
-
Cyber Intelligence-Driven Risk : How to Build and Use Cyber Intelligence for Business Risk Decisions
by: Moore, Richard O. III
Published: (2021) -
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005) -
Cyber security culture : counteracting cyber threats through organizational learning and training
by: Trim, Peter R.J
Published: (2013) -
Data-driven security
by: Jacobs, Jay
Published: (2014) -
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009)