Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Bedankt voor het vertrouwen het afgelopen jaar! Om jou te bedanken bieden we GRATIS verzending aan op alles gedurende de hele maand januari.
Afhalen na 1 uur in een winkel met voorraad
Gratis thuislevering in België
Ruim aanbod met 7 miljoen producten
Bedankt voor het vertrouwen het afgelopen jaar! Om jou te bedanken bieden we GRATIS verzending aan op alles gedurende de hele maand januari.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management,...Lees meer
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with th...Lees meer
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint coveri...Lees meer
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Lees meer
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of t...Lees meer
While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Prof...Lees meer
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of info...Lees meer
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Lees meer
The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitor...Lees meer
In "Finding your Granite", Executive Leadership Coach and Mentor Douglas Pflug walks you through some of the life experiences, lessons and key take-wa...Lees meer
This book defines what IoT Systems manageability looks like and what the associated resources and costs are of that manageability. It identifies IoT S...Lees meer
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal prov...Lees meer
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business...Lees meer
Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for an...Lees meer
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scal...Lees meer
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given or...Lees meer
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as securi...Lees meer
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing ...Lees meer
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technica...Lees meer
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...Lees meer
Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketpl...Lees meer
Most people dread writing reports; they also dread reading reports. What they don't realize is that the techniques that make writing more readable mak...Lees meer
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud t...Lees meer
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk manageme...Lees meer