1-8
of
8
results
-
Information Security Governanc...Security practitioners must be able to build cost-effective security programs ... Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms... more
-
Small State Studies Agency Sec...Agency Security and Governance of Small States examines what seems to be a def... Agency Security and Governance of Small States examines what seems to be a defining paradox of Small-State Studies: the simultaneous coexistence (and possible co-dependence) of vulnerability and opportunity related to small-state size. This book... more
-
Cloud Security: Attacks Techni...Cloud computing has gained paramount attention and most of the companies are a... Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm it has... more
-
Data Governance Terminology (P...As data generation surges effective data governance becomes indispensable. It ... As data generation surges effective data governance becomes indispensable. It encompasses the oversight management and security of data throughout its lifecycle. A robust data governance framework involves establishing clear roles policies and... more
-
Pre-Owned International IT Gov...An essential resource for business managers at any-sized organization this boo... An essential resource for business managers at any-sized organization this book provides the current best practice in managing data and information risks as companies face increasingly complex and dangerous threats to information security. The... more
-
Pre-Owned Cloud Computing: An ...This overview of cloud computing in a self-teaching format contains state-of-t... This overview of cloud computing in a self-teaching format contains state-of-the art chapters with tips and insights about cloud computing its architecture applications information on security and privacy and numerous case studies. It includes... more
-
Polycentric World Order in the...The world order is evolving toward polycentricity producing its winners and lo... The world order is evolving toward polycentricity producing its winners and losers and driving up the global and regional demand for governance security justice and ethics. The book offers a perspective of key Russian experts in international... more
-
Microsoft Cybersecurity Archit...Unlock your potential to pass the SC-100 exam by mastering advanced cloud secu... Unlock your potential to pass the SC-100 exam by mastering advanced cloud security strategies designing zero-trust architectures and evaluating cybersecurity frameworks with this latest exam guide Purchase of this book unlocks access to web-based... more
Ads related to cloud security governance automation