Search

Your search keyword '"CISO"' showing total 207 results

Search Constraints

Start Over You searched for: "CISO" Remove constraint "CISO" Category computers / networking / general Remove constraint Category: computers / networking / general
207 results on '"CISO"'

Search Results

51. The Change Agent : Transforming an Underperforming Internal Audit Department

52. Cybersecurity for Decision Makers

53. Leading the Digital Workforce : IT Leadership Peak Performance and Agility

54. Cybersecurity Operations and Fusion Centers : A Comprehensive Guide to SOC and TIC Strategy

55. Zero Trust Journey Across the Digital Estate

56. The Auditor’s Guide to Blockchain Technology : Architecture, Use Cases, Security and Assurance

57. Digital Transformation Handbook

58. Executive's Cybersecurity Program Handbook : A Comprehensive Guide to Building and Operationalizing a Complete Cybersecurity Program

59. Zero Trust Overview and Playbook Introduction : Guidance for Business, Security, and Technology Leaders and Practitioners

60. HCI in Business, Government and Organizations : 10th International Conference, HCIBGO 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings, Part I

61. HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings

62. Mobile Wireless Middleware, Operating Systems and Applications : 11th EAI International Conference, MOBILWARE 2022, Virtual Event, December 28-29, 2022, Proceedings

63. Computer Security. ESORICS 2022 International Workshops : CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers

64. Digital Blood on Their Hands : The Ukraine Cyberwar Attacks

65. Freedom and Social Inclusion in a Connected World : 17th IFIP WG 9.4 International Conference on Implications of Information and Digital Technologies for Development, ICT4D 2022, Lima, Peru, May 25–27, 2022, Proceedings

66. Agile Enterprise Risk Management : Risk-Based Thinking, Multi-Disciplinary Management and Digital Transformation

67. Evidence-Based Cybersecurity : Foundations, Research, and Practice

68. Losing the Cybersecurity War : And What We Can Do to Stop It

69. HCI for Cybersecurity, Privacy and Trust : 4th International Conference, HCI-CPT 2022, Held As Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 – July 1, 2022, Proceedings

70. Next-Generation Enterprise Security and Governance

71. 6G Enabling Technologies : New Dimensions to Wireless Communication

72. Mind the Tech Gap : Addressing the Conflicts Between IT and Security Teams

73. Digital Forensics and Cyber Crime : 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings

74. Controlling Privacy and the Use of Data Assets - Volume 1 : Who Owns the New Oil?

75. Cyber Warfare, Security and Space Research : First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers

76. Nordic Artificial Intelligence Research and Development : 4th Symposium of the Norwegian AI Society, NAIS 2022, Oslo, Norway, May 31 – June 1, 2022, Revised Selected Papers

77. Socio-Technical Aspects in Security : 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers

78. Simulation Tools and Techniques : 13th EAI International Conference, SIMUtools 2021, Virtual Event, November 5-6, 2021, Proceedings

79. Radical Reporting : Writing Better Audit, Risk, Compliance, and Information Security Reports

80. Human Aspects of Information Security and Assurance : 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings

81. Stuxnet to Sunburst : 20 Years of Digital Exploitation and Cyber Warfare

82. Advances in Cyber Security : Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers

83. CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-002)

84. Recent Trends in Blockchain for Information Systems Security and Privacy

85. CompTIA Network+ Guide to Networks

86. Handbook of Big Data Analytics : Methodologies, Volume 1

87. IT Governance and Information Security : Guides, Standards, and Frameworks

88. CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-002)

89. Progress in Cryptology – INDOCRYPT 2021 : 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings

90. Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I

91. Die digitale Transformation der Automobilindustrie : Treiber - Roadmap - Praxis

92. Cyber Intelligence-Driven Risk : How to Build and Use Cyber Intelligence for Business Risk Decisions

93. CISSP Exam Cram

94. CompTIA Network+ Guide to Networks

95. It’s Your Digital Life

96. Design Science Research. Cases

97. The Art of Network Penetration Testing : How to Take Over Any Company in the World

98. The NICE Cyber Security Framework : Cyber Security Management

99. IT Auditing Using Controls to Protect Information Assets, Third Edition

100. Computer Security : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers

Catalog

Books, media, physical & digital resources