1
by Evans, Ariel
Published 2022
Routledge
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

2
by McElwee, Gerard
Published 2015
Emerald
Table of Contents: ... enterprises in developing and transition economies / Colin C. Williams -- Modelling entrepreneurial endeavour...

3
by Chelly, Magda Lilia, Tan, Shamane, Tran, Hai
Published 2022
Packt Publishing Ltd.
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

4
by Chelly, Magda Lilia, Tan, Shamane, Trần, Hải
Published 2023
Packt Publishing
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

5
by Gottschalk, Petter
Published 2009
Edward Elgar
Subjects: ...Business enterprises / Corrupt practices...

6
by Cooper, Cary L.
Published 2009
Edward Elgar
Subjects: ...Business enterprises / Corrupt practices / Research...

7
by Bolongaita, Emil P.
Published 2004
World Bank
Subjects: ...Business enterprises / Corrupt practices / Asia / Case studies...

8
by Chaput, Bob
Published 2023
Apress
Table of Contents: ...Part I: A Case for Action -- Chapter 1: Enterprise Cyber Risk Management as a Value Creator...

9
by Gottschalk, Petter, Hamerton, Christopher
Published 2022
Palgrave Macmillan
Subjects: ...Business enterprises / Finance...

10
by Monte, Matthew
Published 2015
Wiley
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

11
by Platt, Stephen
Published 2015
Palgrave Macmillan UK
Subjects: ...Business enterprises / Finance...

12
by Liska, Allan
Published 2018
O'Reilly Media
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

13
by Ulsch, N. MacDonnell
Published 2014
Wiley
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

14
by Edwards, Jason, Weaver, Griffin
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... and Awareness -- The Ethical Dimension of Cybersecurity Leadership -- Balancing Business Objectives...

15
by Krausz, Michael
Published 2013
IT Governance Pub.
Table of Contents: ...Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a...

16
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents: ... and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business...

17
by Kelly, Robert J.
Published 1999
Springer US
Table of Contents: ... of Organized Crime -- Summary -- Notes -- 9 Conclusions -- The Troika of Organized Crime -- Business...

18
by Aslaner, Milad
Published 2024
Packt Publishing, Limited
... guidance to align security strategies with your business goals Derive actionable insights from real-world...

19
by Quayson, Ato
Published 2012
Routledge
Subjects: ...International business enterprises / Moral and ethical aspects / fast...

20
by Grimes, Roger A.
Published 2022
Wiley
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...