The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Complete Guide to CISM Certificationby Thomas R. Peltier; Justin Peltier

    CRC Press 2006; US$ 109.95

    Information Security Governance Functional Area Overview Introduction Developing an Information Security Strategy in Support of Business Strategy and Direction Senior Management Commitment and Support Definitions of Roles and Responsibilities Obtaining Senior Management Commitment Establish Reporting Communications That Support... more...

  • Information Security Risk Analysis, Second Editionby Thomas R. Peltier

    CRC Press 2005; US$ 87.95

    INTRODUCTION Frequently asked questions Conclusion RISK MANAGEMENT Overview Risk Management as Part of the Business Process Employee Roles and Responsibilities Information Security Life Cycle Risk Analysis Process Risk Assessment Cost-Benefit Analysis Risk Mitigation Final Thoughts RISK ASSESSMENT PROCESS Introduction Risk Assessment Process Information... more...

  • Information Security Policies, Procedures, and Standardsby Thomas R. Peltier

    CRC Press 2001; US$ 104.95

    Introduction Writing Mechanics and the Message Attention Spans Key Concepts Topic Sentence and Thesis Statement The Message Writing Don'ts Summary Policy Development Introduction Policy Definitions Frequently Asked Questions Polices are Not Enough What is a Policy Policy Format Policy Content Program Policy Examples Topic-Specific Policy Statements... more...

  • How to Complete a Risk Assessment in 5 Days or Lessby Thomas R. Peltier

    CRC Press 2008; US$ 99.95

    The Facilitated Risk Analysis and Assessment Process (FRAAP) Risk Analysis (Project Impact Analysis) Pre-Screening Business Impact Analysis Gap Analysis Appendix A Facilitator Skills Appendix B FRAAP Team Members Appendix C Project Scope Statement Appendix D Laws, Standards, and Regulations Appendix E Frequently Asked Questions about... more...

  • Information Security Risk Analysis, Third Editionby Thomas R. Peltier

    CRC Press 2010; US$ 83.95

    INTRODUCTION Frequently Asked Questions Conclusion RISK MANAGEMENT Overview Risk Management as Part of the Business Process Employee Roles and Responsibilities Information Security Life Cycle Risk Analysis Process Risk Assessment Cost-Benefit Analysis Risk Mitigation Final Thoughts RISK ASSESSMENT PROCESS Introduction Risk Assessment Process... more...

  • Information Security Fundamentals, Second Editionby Thomas R. Peltier

    CRC Press 2013; US$ 69.95

    Developing Policies; Thomas R. Peltier Organization of Information Security; Patrick D. Howard Cryptology; Maria Dailey Risk Management: The Facilitated Risk Analysis and Assessment Process; Thomas R. Peltier Building and Maintaining an Effective Security Awareness Program; John G. O?Leary Physical Security; John A. Blackley Disaster Recovery... more...

  • Information Security Policies and Proceduresby Thomas R. Peltier

    CRC Press 2004; US$ 125.95

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction... more...

  • Information Security Risk Analysisby Thomas R. Peltier

    CRC Press 2001; US$ 74.95

    Effective Risk Analysis Qualitative Risk Analysis Value Analysis Other Qualitative Methods Facilitated Risk Analysis Process (FRAP) Other Uses of Qualitative Risk Analysis Case Study Appendix A: Questionnaire Appendix B: Facilitated Risk Analysis Process Forms Appendix C: Business Impact Analysis Forms Appendix D: Sample of Report Appendix E: Threat... more...

  • Managing A Network Vulnerability Assessmentby Thomas R. Peltier; Justin Peltier; John A. Blackley

    CRC Press 2003; US$ 89.95

    The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused... more...

  • The Total CISSP Exam Prep Bookby Thomas R. Peltier; Patrick D. Howard; Bob Cartwright

    CRC Press 2002; US$ 109.95

    Introduction PRACTICE STUDY QUESTIONS Access Control Systems and Methodology Domain Telecommunications and Network Security Domain Security Management Practices Domain Applications and System Development Security Domain Cryptography Domain Security Architecture and Models Domain Operations Security Domain Business Continuity Planning and Disaster Recovery... more...

  • 1
  • Page