1
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

2
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ...Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10...

3
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...Chapter 14: VulnerabilitiesChapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence...

4
by Seaman, Jim, Gioia, Michael
Published 2023
CRC Press
Table of Contents: ....</P></B><P>2.1 A Vehicle Wheel and Tire/Tyre analogy. re2.2 Introduction to Business Impact Analysis...

5
Published 2023
Routledge
Table of Contents: ... -- The Appearance of Mathematics in Corporate Management -- 2.2 Proposed Model -- Decisions, Sustainability...

6
by Feuer, Michael J.
Published 2011
Wiley
Table of Contents: ... Precious Resource -- 22. Lesson #22: How to Avoid Analysis Paralysis by Learning When to Make "Battlefield...

7
by Shivakumar, Shailesh Kumar
Published 2015
Morgan Kaufmann, an imprint of Elsevier
Table of Contents: .... Ensuring High Availability for Your Enterprise Web Applications -- 2.1. Introduction -- 2.2. High...

8 Table of Contents: ... -- 6.3 -- Physical State of the Released ­Substance -- 6.4 -- Equipment Vulnerability -- 6.4.1...

9
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... Cyber Loss Processes; 2.2 Data Exfiltration; 2.2.1 Protecting Your Data; 2.2.2 Regulation and Data...

10
Published 2023
CRC Press
Table of Contents: ...</STRONG> </P><P><EM>Lukman Raimi</EM></P><P></P><P><STRONG>22. Building Cybersecurity Capacity through...

11
Published 2013
Wiley
Table of Contents: ... -- CHAPTER TWO Principles of Workforce Asset Management -- 2.1 THE A.C.T.I.V.E. PRINCIPLES -- 2.2 SUSTAINING...