Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint coveri...Lees meer
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of t...Lees meer
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and se...Lees meer
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Lees meer
This isn't just a book. It is a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and ...Lees meer
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Lees meer
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend o...Lees meer
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity pro...Lees meer
He didn't just chase cybercriminals--he became one of them. In this electrifying blend of true crime, cyber espionage, and undercover spycraft, former...Lees meer
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of info...Lees meer
In "Finding your Granite", Executive Leadership Coach and Mentor Douglas Pflug walks you through some of the life experiences, lessons and key take-wa...Lees meer
The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitor...Lees meer
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal prov...Lees meer
This book on Governance, Risk Management and Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across var...Lees meer
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while per...Lees meer
Stepping into an IT leadership role for the first time? Feeling overwhelmed by the transition from technical expert to people manager? You're not alon...Lees meer
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business...Lees meer
Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for an...Lees meer
Most people dread writing reports; they also dread reading reports. What they don't realize is that the techniques that make writing more readable mak...Lees meer
Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketpl...Lees meer
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as securi...Lees meer
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing ...Lees meer
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...Lees meer
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk manageme...Lees meer