The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Taylor and Francis 2006; US$ 99.95
The Certified Information Security Manager ® (CISM ® ) certification program was developed by the Information Systems Audit and Controls Association (ISACA ® ). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM ® Certification... more...
- Taylor and Francis 2004; US$ 113.95
Information Security Policies and Procedures: A Practitioner?s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents... more...
- Taylor & Francis 2001; US$ 74.95
Information Security Risk Analysis will allow any organization to implement risk management techniques that will prove to be cost effective. Using the PARA (Practical Application of Risk Analysis) process the book examines the qualitative risk analysis process and then provides tested variations on the methodology. The PARA process can be used by information... more...
- CRC Press 2005; US$ 87.95
A veteran of computer technology and especially computer security, Peltier presents a variety of concepts and ideas about risk analysis, and demonstrates how they can be used. He covers risk management, the risk assessment process, quantitative versus qualitative approaches, other forms of qualitative risk assessment, the facilitated risk analysis more...
- Taylor and Francis 2013; US$ 97.95
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures,... more...
- Taylor and Francis 2008; US$ 91.95
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how... more...
- Taylor and Francis 2013; US$ 83.95
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to... more...
- Taylor and Francis 2013; US$ 69.95
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise?s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals... more...
- Taylor and Francis 2004; US$ 81.95
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused... more...
- Taylor and Francis 2004; US$ 72.95
Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamentals allows future security professionals to gain a solid... more...