Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Savoir plus
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint coveri...Savoir plus
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and se...Savoir plus
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of t...Savoir plus
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Savoir plus
He didn't just chase cybercriminals--he became one of them. In this electrifying blend of true crime, cyber espionage, and undercover spycraft, former...Savoir plus
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend o...Savoir plus
Unleash your inner dynamo and step into the spotlight with confidence, clarity, and charisma! This isn't your average training manual--it's a turbo-ch...Savoir plus
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity pro...Savoir plus
This isn't just a book. It is a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and ...Savoir plus
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of info...Savoir plus
In "Finding your Granite", Executive Leadership Coach and Mentor Douglas Pflug walks you through some of the life experiences, lessons and key take-wa...Savoir plus
The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitor...Savoir plus
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business...Savoir plus
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while per...Savoir plus
Stepping into an IT leadership role for the first time? Feeling overwhelmed by the transition from technical expert to people manager? You're not alon...Savoir plus
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal prov...Savoir plus
This book on Governance, Risk Management and Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across var...Savoir plus
Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for an...Savoir plus
Most people dread writing reports; they also dread reading reports. What they don't realize is that the techniques that make writing more readable mak...Savoir plus
Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketpl...Savoir plus
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...Savoir plus
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing ...Savoir plus
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as securi...Savoir plus