Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Lays out a series of best practices for security managers. This book offers a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Provides the background and tools to create, manage, and execute all facets of an organization's business continuity program (BCP). This book guides the security leader through the development, implementation, and maintenance of a successful BCP.
Examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. This book provides background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program.
Suitable for any security professional working to create or improve an existing corporate crisis management policy, this book provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.