Ensure the success of your security programme by understanding users' motivations"e;This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily.
"e;Love the fact that it jumped in with 10 top tips for security, a great opening to the book Excellent section on phishing emails/vishing/smishing, with great practical examples "e;Christopher Wright, Wright-CandA Consulting LtdProtect yourself from cyber threats and risksCyberspace, the Internet, computer networks, the digital world - call it what you will - is always developing.
Step-by-step guidance on successful ISO 27001 implementation from an industry leaderISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes and technology.
A compendium of essential information for the modern security entrepreneur and practitionerThe modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience.
In this explosive memoir, a political consultant and technology whistleblower reveals the disturbing truth about the multi-billion-dollar data industry, revealing to the public how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump.
The increasing reliance on digital platforms Security and Cyber Laws Digital Defenders has brought significant advancements in communication, business, and daily life.
Penguin presents the unabridged, downloadable, audiobook edition of Agent Storm: My Life Inside al-Qaeda by Morten Storm with Tim Lister and Paul Cruckshanks.