The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment.
"e;If I were giving out an award for 'book of the year' for internal audit professionals, I would certainly award it to her outstanding manuscript: Radical Reporting: Writing Better Audit, Risk, Compliance and Information Security Reports.
Containing fully updated and beautifully illustrated need-to-know info, this revised second edition of the bestselling textbook on fashion buying contains everything today's fashion management student needs to give them a clear head-start in this lucrative but highly competitive industry.
Containing fully updated and beautifully illustrated need-to-know info, this revised second edition of the bestselling textbook on fashion buying contains everything today's fashion management student needs to give them a clear head-start in this lucrative but highly competitive industry.
Social Media for Fashion Marketing uses cutting edge case studies and detailed interviews to show how the business of fashion is changing in the digital landscape.
Events Management provides an introductory overview of the fundamentals in managing events from conception to delivery, highlighting both the theoretical and operational aspects, to prepare students for a career in events management and hospitality.
Events Management provides an introductory overview of the fundamentals in managing events from conception to delivery, highlighting both the theoretical and operational aspects, to prepare students for a career in events management and hospitality.
The fifth edition of Successful Event Management covers every aspect of events management, from the planning and set up process through to delivery, close-down and evaluation.
Fully updated in line with the latest National Occupational Standards, this 5th Edition of the bestselling textbook, Professional Beauty Therapy: Level 3 by Lorraine Nordmann, has been restructured and updated to reflect the changing needs of the beauty industry and students working towards their Level 3 qualification.
Menswear Trends will help you understand the relationship of menswear to society, enabling you to become both a forecaster and trend thinker and bring new ideas, innovation and strategies to men's fashion.
Marketing Fashion Footwear addresses the strategic issues surrounding the marketing and distribution of footwear, including brand identity, consumer behavior, production and manufacturing, and the impact of globalization and regional trends.
If you want to understand, and be a part of, the creative revolution in materials design, then Designing with Smart Textiles is the complete toolkit you need to get started.
This book examines the ways in which cultural and creative industries can drive entrepreneurship, innovation, sustainability and overall regional development.
Archaeological sites opened to the public, and especially those highly photogenic sites that have achieved iconic status, are often major tourist attractions.
The global contract security market now totals over $200 billion, with the number of private security officers exceeding that of public law enforcement officers.
Luxury Fashion Marketing and Branding offers a comprehensive analysis of the key theories and concepts needed to understand the promotion of luxury fashion products.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the subject of corporate security intelligence remains poorly understood.
A creative artist essential to country clubs, resort hotels, convention centers, and cruise ships, the Garde Manger (GM) is responsible for presenting sumptuous dishes to guests who expect tasty foods displayed in a visually appealing manner.
One of the four core phases of emergency management, hazard mitigation is essential for reducing disaster effects on human populations and making communities more resilient to the impacts of hazards.
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world.
The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society.
Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals.
Cargo crime including theft, fraud, and the passage of contraband through commercial shipping lanes poses an enormous threat to security and the economy.
This well-grounded and practical guide highlights the underlying causes of crowd disasters and mass fatalities-giving readers insight into the root causes of crowd-related accidents.
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
The transformation from traditional war between nation-states to conflict between nation-states and nonstate actors requires decision makers, policy analysts, military commanders, intelligence officials, and legislators to answer the question: is there a strategy for an unwinnable conflict?
A comprehensive source of information, this book provides guidance on how to ensure the protection of company proprietary information and the development of a corporate counterespionage program.
Charcuterie, the art of transforming pork meats into various preparations as an array of dishes, has traditionally held a very important place in gastronomy.