Financial Services Law and Distributed Ledger Technology : Regulating Cryptoassets and Decentralised Finance
Brendan McGurk
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2 Guide to the CISSP CBK
Adam Gordon
Download - Immediately Available
Format: eBook (EPUB)
Official (ISC)2 Guide to the CISSP CBK
Adam Gordon
Download - Immediately Available
Format: eBook (PDF)
PRAGMATIC Security Metrics : Applying Metametrics to Information Security
W. Krag, CISM (Enterprise Security Architect, Thousand Oaks, C Brotby
Download - Immediately Available
Format: eBook (PDF)
Complete Guide to CISM Certification
Thomas R. Peltier
Download - Immediately Available
Format: eBook (PDF)
Reforming European Data Protection Law
Serge Gutwirth
Download - Immediately Available
Format: eBook (PDF)
The ABCs of LDAP : How to Install, Run, and Administer LDAP Services
Reinhard E. Voglmaier
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2® Guide to the ISSAP® CBK
(ISC)² Corporate
Download - Immediately Available
Format: eBook (EPUB)
The Complete Book of Data Anonymization : From Planning to Implementation
Balaji Raghunathan
Download - Immediately Available
Format: eBook (PDF)
Data Governance : Creating Value from Information Assets
Neera Bhansali
Download - Immediately Available
Format: eBook (PDF)
Information Security Management : Concepts and Practice
Bel G. Raggad
Download - Immediately Available
Format: eBook (PDF)
Information Security Policy Development for Compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
Barry L. Williams
Download - Immediately Available
Format: eBook (PDF)
Operational Auditing : Principles and Techniques for a Changing World
Hernan (Murdock Global Advisors, Wayland, Massachusetts, USA) Murdock
Download - Immediately Available
Format: eBook (EPUB)
Information Security Architecture : An Integrated Approach to Security in the Organization, Second Edition
Jan Killmeyer
Download - Immediately Available
Format: eBook (PDF)
Handbook of Automated Essay Evaluation : Current Applications and New Directions
Mark D. Shermis
Download - Immediately Available
Format: eBook (EPUB)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP
Orlando Lopez
Download - Immediately Available
Format: eBook (PDF)
Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS
Tyson Macaulay
Download - Immediately Available
Format: eBook (PDF)
Managing Risk and Security in Outsourcing IT Services : Onshore, Offshore and the Cloud
Frank Siepmann
Download - Immediately Available
Format: eBook (PDF)
Digital Forensics for Handheld Devices
Eamon P. Doherty
Download - Immediately Available
Format: eBook (PDF)
Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler
Download - Immediately Available
Format: eBook (EPUB)
Fiber to the Home : The New Empowerment
Jr. Paul E. Green
Download - Immediately Available
Format: eBook (PDF)