1
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

2
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ...Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10...

3
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...Chapter 14: VulnerabilitiesChapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence...

4
Published 2023
Routledge
Table of Contents: ... -- The Appearance of Mathematics in Corporate Management -- 2.2 Proposed Model -- Decisions, Sustainability...

5
by Feuer, Michael J.
Published 2011
Wiley
Table of Contents: ... Precious Resource -- 22. Lesson #22: How to Avoid Analysis Paralysis by Learning When to Make "Battlefield...

6
by Shivakumar, Shailesh Kumar
Published 2015
Morgan Kaufmann, an imprint of Elsevier
Table of Contents: .... Ensuring High Availability for Your Enterprise Web Applications -- 2.1. Introduction -- 2.2. High...

7
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... Cyber Loss Processes; 2.2 Data Exfiltration; 2.2.1 Protecting Your Data; 2.2.2 Regulation and Data...

8
Published 2023
CRC Press
Table of Contents: ...</STRONG> </P><P><EM>Lukman Raimi</EM></P><P></P><P><STRONG>22. Building Cybersecurity Capacity through...

9
Published 2013
Wiley
Table of Contents: ... -- CHAPTER TWO Principles of Workforce Asset Management -- 2.1 THE A.C.T.I.V.E. PRINCIPLES -- 2.2 SUSTAINING...