Leading the Internal Audit Function
Lynn (Consulting, Business Advisory and Training, Overland P Fountain
Download - Immediately Available
Format: eBook (PDF)
Behavioral Cybersecurity : Fundamental Principles and Applications of Personality Psychology
Wayne (Wayne Patterson, Patterson and Associates) Patterson
Download - Immediately Available
Format: eBook (PDF)
Phishing Detection Using Content-Based Image Classification
Shekhar (IBM software labs) Khandelwal
Download - Immediately Available
Format: eBook (EPUB)
Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler
Download - Immediately Available
Format: eBook (EPUB)
Cybersecurity Study Guide : Mastering Cyber Security Defense to Shield Against Identity Theft, Data breaches, Hackers, and more in the Modern Age
Sam O.A
Download - Immediately Available
Format: eBook (EPUB)
Sharing Health Data : The Why, the Will, and the Way Forward
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Health Data Sharing to Support Better Outcomes : Building a Foundation of Stakeholder Trust
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
2020 Census Data Products: Data Needs and Privacy Considerations : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Legal Data and Information in Practice : How Data and the Law Interact
Sarah A. Sutherland
Download - Immediately Available
Format: eBook (PDF)
Legal Data and Information in Practice : How Data and the Law Interact
Sarah A. Sutherland
Download - Immediately Available
Format: eBook (EPUB)
Malicious Mobile Code : Virus Protection for Windows
Roger A. Grimes
Download - Immediately Available
Format: eBook (EPUB)
Malicious Mobile Code : Virus Protection for Windows
Roger A. Grimes
Download - Immediately Available
Format: eBook (PDF)
The Identity Trade : Selling Privacy and Reputation Online
Nora A. Draper
Download - Immediately Available
Format: eBook (EPUB)
An Introduction to Data Structures and Algorithms
J.A. Storer
Download - Immediately Available
Format: eBook (PDF)
Computers, Business, and Security : The New Role for Security
James A Schweitzer
Download - Immediately Available
Format: eBook (PDF)
Cybercrime : Key Issues and Debates
Alisdair A. Gillespie
Download - Immediately Available
Format: eBook (EPUB)
Fraud Hotlines : Design, Performance, and Assessment
Chelsea A. Binns
Download - Immediately Available
Format: eBook (EPUB)
Hacking the Hacker : Learn From the Experts Who Take Down Hackers
Roger A. Grimes
Download - Immediately Available
Format: eBook (PDF)
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto
Roger A. Grimes
Download - Immediately Available
Format: eBook (PDF)
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto
Roger A. Grimes
Download - Immediately Available
Format: eBook (EPUB)
Ransomware Protection Playbook
Roger A. Grimes
Download - Immediately Available
Format: eBook (EPUB)
Contemporary Issues in Ethics and Information Technology
Robert A. Schultz
Download - Immediately Available
Format: eBook (PDF)