Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with th...Lees meer
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management,...Lees meer
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint coveri...Lees meer
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of t...Lees meer
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and se...Lees meer
This book explains cybersecurity through a simple story rather than diving into execution details. Each chapter is geared to teaching both middle and ...Lees meer
The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticat...Lees meer
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, ...Lees meer
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze offers a refreshing blend of deep insights and engaging humor to demyst...Lees meer
This book explains cybersecurity through a simple story rather than diving into execution details. Each chapter is geared to teaching both middle and ...Lees meer
This book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tool...Lees meer
The digitalization of companies is a recurrent topic of conversation for managers. Long gone are the days of auditors specializing in one technique. T...Lees meer
In "Finding your Granite" Executive Leadership Coach Douglas Pflug walks you through some of the life experiences, lessons and key take-ways from his ...Lees meer
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while per...Lees meer
In Members, Methods, and Measures , Thomas E. Armstrong delivers the guide he wishes he had when he was thrust into management-without a roadmap, trai...Lees meer
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal prov...Lees meer
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business...Lees meer
With its comprehensive analysis of all aspects of the SOFC, from team building to incident response, this book is an invaluable resource to establish ...Lees meer
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scal...Lees meer
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technica...Lees meer
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...Lees meer
This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standar...Lees meer
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as securi...Lees meer
Most people dread writing reports; they also dread reading reports. What they don't realize is that the techniques that make writing more readable mak...Lees meer