To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the signif...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations,...Lasīt vairāk
This book aims to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third-party arrangements and emphasises that organisations retain account...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulatio...Lasīt vairāk
The aim of this book is to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data. All aspects of AI, machine learning mode...Lasīt vairāk
Leading the Digital Workforce:Future IT leaders wont be technology leaders, theyll be business leaders who understand technology. Leading the Digital Workforce takes a fresh look at technology leadership, exploring how to lead and manage...Lasīt vairāk
This book demonstrates how information security requires a deep understanding of an organizations assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how...Lasīt vairāk
This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical b...Lasīt vairāk
This book delves into the critical realm of cyber security, specifically focusing on the ever-present threats that can cripple your organization. We will dissect real-world attacks methods and mitigation strategies, analyze industry and regulatory...Lasīt vairāk
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as w...Lasīt vairāk
Thoroughly revised to include the latest industry developments, the Second Edition presents a comprehensive overview of computer validation and verification principles and how to put them into practice. To provide the current best practice and gui...Lasīt vairāk
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for...Lasīt vairāk
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and...Lasīt vairāk
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. It provides just enough practical skills and techniques for security leaders to get the jo...Lasīt vairāk