1234567Next[10]

Information Security Governance

Information Security Governance

Information Security Governance: Given the vast array of possible IT threats, security governance is crucial to all levels of a company. This book on...

The CISM Prep Guide: Mastering the Five Domains of Information Security Management

The Cism Prep Guide: Mastering The Five Domains Of Information Se...

The Cism Prep Guide: Mastering The Five Domains Of Information Security Management: New Mint Condition Dispatch same day for order received before 12 noon Guaranteed packaging No quibbles...

IT Governance: An International Guide to Data Security and ISO27001/ISO27002

It Governance: An International Guide To Data Security And Iso270...

It Governance: An International Guide To Data Security And Iso27001/iso27002: IT Governance offers a full understanding of how best to deal with information security risks, including an overview of...

IT Cyber Security

It Cyber Security

It Cyber Security: <p>Master the advanced techniques required to protect network resources from external threat with the IT Cyber...

Data Governance: How to Design, Deploy and Sustain an Effective Data Governance Program (The Morgan Kaufmann Series on Business Intelligence)

Data Governance: How To Design, Deploy And Sustain An Effective D...

Data Governance: How To Design, Deploy And Sustain An Effective Data Governance Program (the Morgan Kaufmann Series On Business Intelligence): Suitable for any manager or team leader that has the green light to implement a data governance program, this book...

The Handbook of Board Governance: A Comprehensive Guide for Public, Private and Not for Profit Board Members

The Handbook Of Board Governance: A Comprehensive Guide For Publi...

The Handbook Of Board Governance: A Comprehensive Guide For Public, Private And Not For Profit Board Members: Build a more effective board with insight from the forefront of corporate governance The Handbook of Board Governance...

Corporate Governance and Chairmanship A Personal View

Corporate Governance And Chairmanship A Personal View

Corporate Governance And Chairmanship A Personal View: Corporate governance has become a major issue in business. This text reflects on issues of corporate governance and...

Corporate Governance: Principles, Policies, and Practices

Corporate Governance: Principles, Policies, And Practices

Corporate Governance: Principles, Policies, And Practices: Written by the \'father of corporate governance\', this text is an authoritative guide to the frameworks of power that...

Norton Mobile Security 3.0 for 1 user

Norton Mobile Security 3.0 For 1 User

Norton Mobile Security 3.0 For 1 User: **Why Norton? Mobile Security?** Contacts. Photos. Texts. Email. Bank information. Passwords. And more. You store lots...

Norton Mobile Security 3.0 for 1 user

Norton Mobile Security 3.0 For 1 User

Norton Mobile Security 3.0 For 1 User: Contacts. Photos. Texts. Email. Bank information. Passwords. And more. You store lots of personal information and...

Norton Mobile Security 3.0 1 User Card Mmm

Norton Mobile Security 3.0 1 User Card Mmm

Norton Mobile Security 3.0 1 User Card Mmm: Protect your mobile device and the information on it with Norton Mobile Security. If your mobile device is lost,...

Panda Internet Security 2016 1 Device 1 Year

Panda Internet Security 2016 1 Device 1 Year

Panda Internet Security 2016 1 Device 1 Year: Maximum protection for all devices Panda Internet Security protects your PC, Mac and Android devices, plus your iPad,...

Panda Internet Security 2016 3 Devices 1 Year

Panda Internet Security 2016 3 Devices 1 Year

Panda Internet Security 2016 3 Devices 1 Year: Maximum protection for all devices Panda Internet Security protects your PC, Mac and Android devices, plus your iPad,...

Bitdefender Mobile Security

Bitdefender Mobile Security

Bitdefender Mobile Security: Bitdefender Mobile Security provides smart antivirus and web security for devices running Android. Its in-the-cloud...

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide

Cissp (isc)2 Certified Information Systems Security Professional ...

Cissp (isc)2 Certified Information Systems Security Professional Official Study Guide: CISSP Study Guide - fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC) 2 Certified Information Systems...

Panasonic WV-SW174WE surveillance camera - security cameras (IP, Outdoor, Box, Grey, 1280 x 960 pixels, 720p)

Panasonic Wv-sw174we Surveillance Camera - Security Cameras (ip, ...

Panasonic Wv-sw174we Surveillance Camera - Security Cameras (ip, Outdoor, Box, Grey, 1280 X 960 Pixels, 720p): Wireless HD Outdoor Pan Tilt IP Camera - WPS (Wi-Fi Protected Setup): automatically obtain the connection configuration...

Norton Security Premium 3.0 25GB 1 User 10 Devices - Electronic Software Download

Norton Security Premium 3.0 25gb 1 User 10 Devices - Electronic S...

Norton Security Premium 3.0 25gb 1 User 10 Devices - Electronic Software Download: See more, analyze more and stop more online threats How long does it take for malware to infect your computer? If you...

Norton Security Deluxe V.3.0) 1 User 3 Devices - Electronic Software Download

Norton Security Deluxe V.3.0) 1 User 3 Devices - Electronic Softw...

Norton Security Deluxe V.3.0) 1 User 3 Devices - Electronic Software Download: See more, analyze more and stop more online threats How long does it take for malware to infect your computer? If you...

Norton Security Deluxe 3.0 In 1 User 5 Devices Card

Norton Security Deluxe 3.0 In 1 User 5 Devices Card

Norton Security Deluxe 3.0 In 1 User 5 Devices Card: See more, analyze more and stop more online threats How long does it take for malware to infect your computer? If you...


1234567Next[10]


  • News Mentions