Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Increasingly, organisations rely on information for their day-to-day operations, and the loss or unavailability of information can mean the difference between success and ruin. Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It also includes a chapter on applying IRM in the public sector. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management.
In Reach for Your Star, the author takes readers on a journey through life using the art of poetry. With pieces that range from humorous to serious, these poems capture the many facets of the human experience and the ways in which we express ourselves. Whether through the arts, sports, academics, charity work, or dedication to a cause, we all seek out paths that allow us to be our authentic selves. This collection of poetry is a celebration of the unique journey that each of us embarks on as we strive to reach for our own star.
Until recently, if it has been considered at all in the context of business continuity, cyber security may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyber-attacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large or small, public or private sector. Cyber security is one aspect of information security, since the impacts or consequences of a cyber-attack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity or availability of an organization's information assets. The main difference between information security and cyber security is that while information security deals with all types of information assets, cyber security deals purely with those which are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity and disaster recovery programs in place, and it is not the intention of this book to re-write those, but to inform organizations about the kind of precautions they should take to stave off successful cyber-attacks and how they should deal with them when they arise in order to protect the day-to-day businesses.
Highly engaging and accessible for students of Anthropology, Film and Media, Hollywood Blockbusters explains why Jaws, The Big Lebowski, The Godfather, Field of Dreams and The Village have such an enduring appeal.
Proposing that the 'forbidden fruit' eaten by Adam and Eve was in fact a fig rather than an apple, this book explores the history of the fruit in fascinating detail, from the Crusaders to the wonderful fig festivals of the modern world.
This is the first full-length study of one of the most popular, profitable and persistent genres in British cinema. It redraws the map of British film history by arguing that comedy was the most successful, and important, genre of the 1930s, and that the very qualities which ensured the comedy film's low status are also its particular strengths.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.