3
by Davidoff, Sherri
Published 2020
Addison-Wesley
... the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused...

4
by Grimes, Roger A.
Published 2022
Wiley
Table of Contents: ... ; Minimizing Damage ; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...

5
by Krausz, Michael
Published 2014
IT Governance Press
Table of Contents: ...: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence...

6
by Shankman, Peter
Published 2011
Que
Table of Contents: ...) -- Before the explosion: winning your customer -- Customer service is a way of life -- Social media damage...

7
by Thompson, Lemaro
Published 2022
MIT Sloan Management Review
... five recommendations to help managers avoid the damage to workplace relationships and culture that can...

8
by Fattoracci, Elisa S. M., Garcia, Larissa R.
Published 2024
MIT Sloan Management Review
... damage our sense of belonging and feelings of psychological safety. But saying someone’s name correctly...

9
by Barefoot, Darren
Published 2010
No Starch Press
Table of Contents: ... -- Measuring success : how to monitor the Web -- Is social media marketing risky business? -- Damage control...

10
by Krausz, Michael
Published 2013
IT Governance Pub.
... or information breach and explains how managers can determine the business damage caused...

11
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

12
by Kasian-Lew, Dionne
Published 2014
Wiley
Table of Contents: ...Gargantuan and growing : the digital economy -- Six damaging myths about social media -- Mindshift...

13
by Mitchell, Stewart
Published 2009
IT Governance Pub.
... the key measures you need to take to handle the situation and to minimise the damage. The information...

14
by Waschke, Marvin
Published 2017
Apress

15
by Kelly, Bob
Published 2008
Wiley
Table of Contents: .... Protecting User Data -- Ch. 13. Recovering Damaged Systems and Lost Data...

16
by Schreane, Keesa C.
Published 2023
John Wiley & Sons, Inc.
... damage, and loss of customers and investors. This book explores how institutional investors...

17
by Romano, Denise A.
Published 2010
McGraw-Hill
Table of Contents: ..., and environments that damage employee health, efficiency, and profits -- Roundup of additional legal issues...

18
by Gupta, Sunil
Published 2018
Packt Publishing
... mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too...

19
by Gasmi, Nacer
Published 2021
ISTE, Ltd.
Table of Contents: ... Which Corrects and/or Anticipates Potential Damage to the Company -- Innovation and Ecosystem as Key...

20
by Spilcă, Laurenţiu
Published 2020
Manning Publications Co.
... damage. You'll start with the basics, simulating password upgrades and adding multiple types...