-
A Guide to Effective Internal Management System Audits
Author Andrew Nichols
Are your internal audits adding value?Organizations hoping to comply with any of the International Standards for management systems (e.g. ISO9001, ISO27001) must carry out internal audits. However, the requirements set down by accreditation bodies for auditor course....
Release Date 2014/06 -
Author Araceli Treu Gomes , Ira Winkler
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book....
Release Date 2016/11 -
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things
Author Alan Field
When is a gift not a gift? When it’s a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, cor....
Release Date 2015/04 -
An Introduction to Information Security and ISO27001: A Pocket Guide
Author Steve G Watkins
This new pocket guide is intended to meet the needs of two groups: Individual readers who have turned to it as an introduction to a topic that they know little about; and organizations implementing, or considering implementing, some sort of information security mana....
Release Date 2008/10 -
Application Security in the ISO 27001:2013 Environment
Author Vinod Vasudevan
Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cybersecurity threats proliferate and attacks escalate, and as applications pl....
Release Date 2015/10 -
Application Security in the ISO27001 Environment
Author Anbalahan Siddharth , Pakala Sangit , Shetty Sachin , Ummer Firosh , Mangla Anoop , V
As conduits of critical business data, it's vital that your software packages are adequately secured. The de-facto standard on application security, this book is your step-by-step guide to securing your software applications within a best practice ISO/IEC 27001 and....
Release Date 2008/04 -
Bookkeeping Essentials: How to Succeed as a Bookkeeper
Author Steven M. Bragg
The handy problem-solver with helpful information for today's busy bookkeepersBookkeeping Essentials: How to Succeed as a Bookkeeper is the handy problem-solver that gives today's busy bookkeepers and accountants the helpful information they need in a quick-refere....
Release Date 2011/04 -
Coping with Unplanned Absences: A Pocket Guide
Author Sarah Cook
Unplanned absence from work could cost the UK economy as much as £12 billion a year! When your organisation can no longer meet its deadlines, or provide customers with the high quality of service they expect, you have a problem. Unplanned absence also has a bad effe....
Release Date 2010/06 -
Author Kathleen Iannello
Decisions Without Hierarchy is based on a two-year examination of three feminist organizations: a peace group, health collective, and business women's group. From these case studies, Iannello constructs a model of organizations that, while structured, is neverthele....
Release Date 2013/06 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
Author Patti Shank
To determine if needed results have been achieved, results are often measured and assessed against a predefined set of standards. In instructional design-speak, these standards are commonly known as learning objectives, which should be based on what learners actuall....
Release Date 2009/12 -
Developmental Assignments: Creating Learning Experiences Without Changing Jobs
Author Cynthia D McCauley
This book is modeled after "Eighty-eight Assignments for Development in Place," one of CCL's most popular publications. In the years since that report was published, we have learned more about development in place--from research, from working with managers and org....
Release Date 2006/02 -
Dragon Professional Individual For Dummies
Author Stephanie Diamond
Stop typing and get more done with Dragon Professional Individual voice recognition softwareTired of typing, but afraid to take the leap into voice recognition software? No problem! Dragon Professional Individual For Dummies, 5th Edition gives you a great overview ....
Release Date 2016/01 -
Elementary Information Security, 3rd Edition
Author Richard E. Smith
An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with an increase....
Release Date 2019/09 -
Establishing an occupational health & safety management system based on ISO 45001
Author Naeem Sadiq
This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
Release Date 2019/09 -
Fibre Channel for Mass Storage
Author Ralph H. Thornburgh
1022B-8Master Fibre Channel, the next-generation standard for enterprise storage!With Fibre Channel, you can suddenly scale your storage systems from gigabytes to terabytes, and improve performance at the same time -- all without disrupting systems, networks, or ap....
Release Date 1999/04 -
Foundations of Information Security
Author Jason Andress
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world se....
Release Date 2019/10 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
Health Financing Without Deficits
Author Randy S. Miller , Philip J. Romero
America’s health system has been a polarizing issue in most presidential campaigns throughout our lifetimes. It is hardly surprising that an industry that consumes nearly one in every five dollars spent in the U.S. economy will be prominent again in 2016 and ....
Release Date 2016/07 -
How Cyber Security Can Protect Your Business - A guide for all stakeholders
Author Christopher Wright
How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their pe....
Release Date 2019/11 -
How to Survive a Data Breach: A Pocket Guide
Author Stewart Mitchell
This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with s....
Release Date 2009/02 -
Author Maryann Karinch , Gregory Hartley
Are you in business, journalism, law enforcement, or medicine?Do you face students in a classroom or criminals in a courtroom?Are you in a relationship or looking for one?Do you have children?Then you need the skills to read them like a book!I Can Read You Like a Bo....
Release Date 2007/03 -
Author Peter Sidorko , Steve O’Connor
In this information age it is widely recognised that, in order to maintain relevance and to gain a competitive edge, libraries and other organisations in the business of information must continuously assess their roles, collections, services and perhaps most importa....
Release Date 2010/09 -
Author Mukund Chaudhary , Abhishek Chopra
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the tim....
Release Date 2019/12 -
Author Douglas B. Laney
Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their inf....
Release Date 2017/09 -
Author James Joshi , Prashant Krishnamurthy , David Tipper , Yi Qian
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, inte....
Release Date 2010/07 -
Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition
Author Michael Krausz
What if you suffer an information security breach?Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance....
Release Date 2014/05 -
Author Darren Death
Implement information security effectively as per your organization's needs.About This BookLearn to build your own information security framework, the best fit for your organizationBuild on the concepts of threat modeling, incidence response, and security analysis....
Release Date 2017/12 -
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Author Alan Calder , Steve Watkins
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework f....
Release Date 2019/08