1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

3
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

4
Published 2014
Elsevier
Table of Contents: ... with a number of communication -- Platforms to support public protection and disaster relief (ppdr)...

5
by Coden, Michael, Reeves, Martin, Pearlson, Keri, Madnick, Stuart
Published 2023
MIT Sloan Management Review
...Most organizations put more resources toward identification, protection, and detection rather than...

6
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless protection and security; Wired...

7
by Evans, Ariel
Published 2022
Routledge
... reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers...

8
by Rehberger, Johann
Published 2020
Packt Publishing
... ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters...

9
by Liska, Allan
Published 2018
O'Reilly Media
...Many organizations are discovering that traditional security tools alone aren't enough to protect...

10
by Pope, Kelly Richmond
Published 2023
Ascent Audio
... in the hopes of protecting ourselves and our companies. By the time you finish this book, you'll have a better...

11
by Davidoff, Sherri
Published 2020
Addison-Wesley
...Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can...

12
by Sullivan, Kevin
Published 2015
Apress, Distributed to the Book trade worldwide by Springer
..., and prosecutors in following up on reports, catching launderers, and protecting the integrity and reputations...

13
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
... be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways...