Title: Asset Protection through Security Awareness, Author: Tyler Justin Speed
Title: Big Data, Surveillance and Crisis Management, Author: Kees Boersma
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework, Author: Anne Kohnke
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices, Author: Joey Hirao
Title: Security and Control in Information Systems: A Guide for Business and Accounting, Author: Andrew Hawker
Title: Security Metrics, Author: Andrew Jaquith
Title: Strategic Security Management: A Risk Assessment Guide for Decision Makers, Author: Karim Vellani
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: The SBA on PCP protocol: The SBA on PCP protocol, The Push - Check - Pull, Author: Ray Hermann Angossio Liwa