Computer Security Handbook, Set More Books Like This

The Cyber Risk Handbook The Cyber Risk Handbook
2017
Cybersecurity Cybersecurity
2019
GDPR for DevOp(Sec) - The laws, Controls and solutions GDPR for DevOp(Sec) - The laws, Controls and solutions
2017
Beyond Cybersecurity Beyond Cybersecurity
2015
A Leader's Guide to Cybersecurity A Leader's Guide to Cybersecurity
2019
Information and IT Risk Management in a Nutshell Information and IT Risk Management in a Nutshell
2007
Strategic Security Management Strategic Security Management
2006
Contemporary Security Management Contemporary Security Management
2010
Auditing Cloud Computing Auditing Cloud Computing
2011
Managing the Risk of Fraud and Misconduct: Meeting the Challenges of a Global, Regulated and Digital Environment Managing the Risk of Fraud and Misconduct: Meeting the Challenges of a Global, Regulated and Digital Environment
2011
Data Privacy and Trust in Cloud Computing Data Privacy and Trust in Cloud Computing
2020
The Cloud-to-Thing Continuum The Cloud-to-Thing Continuum
2020
Continuous Security Monitoring for DevOps Continuous Security Monitoring for DevOps
2016
Manager's Guide to a Paperless Office Manager's Guide to a Paperless Office
2009
Security Risk Assessment Security Risk Assessment
2014