Open Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Keys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Deviant (Member of the Board of Directors of the U.S. division Ollam
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£34.39
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketInformation Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis
Mark (Chief Threat Scientist of Zvelo Inc) Talabis
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£27.29
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketBreaking into Information Security : Crafting a Custom Career Path to Get the Job You Really Want
Josh (Senior Security Consultant, RJS Smart Security (CISSP, GIA More
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£27.99
£24.69
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketAda and Beyond : Software Policies for the Department of Defense
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program
John (Principal of IMCue Solutions, Editor of the Data Strateg Ladley
Item not Available
Format: Book (Paperback / softback)
£36.99
£31.89
Item not Available
Book (Paperback / softback)
Improving Business Statistics Through Interagency Data Sharing : Summary of a Workshop
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Putting People on the Map : Protecting Confidentiality with Linked Social-Spatial Data
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Protecting Data Privacy in Health Services Research
Institute of Medicine
Download - Immediately Available
Format: eBook (PDF)
Toward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Information Technology for Counterterrorism : Immediate Actions and Future Possibilities
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Confronting Cyber Risk : An Embedded Endurance Strategy for Cybersecurity
Gregory J. (Assistant Professor, Department of Civil and System Falco
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£21.99
£21.45
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketCharting a Path in a Shifting Technical and Geopolitical Landscape : Post-Exascale Computing for the National Nuclear Security Administration
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Privacy Research and Best Practices : Summary of a Workshop for the Intelligence Community
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
A Question of Balance : Private Rights and the Public Interest in Scientific and Technical Databases
National Research Council
Download - Immediately Available
Format: eBook (PDF)
For the Record : Protecting Electronic Health Information
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
For the Record : Protecting Electronic Health Information
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Analysis of Potential Interference Issues Related to FCC Order 20-48
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)