24 livres(s)
Télécharger le livre :  Investigations and the Art of the Interview
Ajouter à ma liste d'envies

Investigations and the Art of the Interview


Lawrence J. Fennelly , Inge Sebyan Black


The Art of Investigative Interviewing, Fourth Edition, builds on the successes of the previous editions providing the reader guidance on conducting investigative interviews, both ethically and professionally.The book can be used by anyone who is involved in...

Parution : 2020-08-27
Format(s) : epub sans DRM
J'achète
73,80
Télécharger le livre :  Cybercrime and Business
Ajouter à ma liste d'envies

Cybercrime and Business


Sanford Moskowitz


Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today's corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately...

Parution : 2017-05-19
Format(s) : PDF, epub sans DRM
J'achète
72,74
Télécharger le livre :  The Information Systems Security Officer's Guide
Ajouter à ma liste d'envies

The Information Systems Security Officer's Guide


Gerald L. Kovacich


The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents...

Parution : 2016-01-12
Format(s) : PDF, epub sans DRM
J'achète
53,75
Télécharger le livre :  The Process of Investigation
Ajouter à ma liste d'envies

The Process of Investigation


John Tsukayama , Charles A. Sennewald , John Tsukayama


The Process of Investigation, Fourth Edition addresses the needs of today’s private sector investigative professional by providing a full-spectrum treatment of the investigative process, from case inception and investigative strategy selection to executing complex...

Parution : 2014-12-30
Format(s) : PDF
J'achète
61,14
Télécharger le livre :  Managing Online Risk
Ajouter à ma liste d'envies

Managing Online Risk


Deborah Gonzalez


In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online...

Parution : 2014-09-25
Format(s) : PDF, epub sans DRM
J'achète
33,71
Télécharger le livre :  Integrated Security Systems Design
Ajouter à ma liste d'envies

Integrated Security Systems Design


Thomas L. Norman


Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly...

Parution : 2014-09-10
Format(s) : PDF, epub sans DRM
J'achète
52,70
Télécharger le livre :  Information Governance and Security
Ajouter à ma liste d'envies

Information Governance and Security


John G. Iannarelli , Michael O'shaughnessy


Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset—its proprietary information—safe from cyber and physical...

Parution : 2014-09-09
Format(s) : PDF, epub sans DRM
J'achète
45,31
Télécharger le livre :  Online Security for the Business Traveler
Ajouter à ma liste d'envies

Online Security for the Business Traveler


Deborah Gonzalez


Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and...

Parution : 2014-08-23
Format(s) : PDF, epub sans DRM
J'achète
14,72
Télécharger le livre :  Measuring and Managing Information Risk
Ajouter à ma liste d'envies

Measuring and Managing Information Risk


Jack Freund , Jack Jones


Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...

Parution : 2014-08-23
Format(s) : PDF, epub sans DRM
J'achète
41,09
Télécharger le livre :  Confidential Information Sources
Ajouter à ma liste d'envies

Confidential Information Sources


John M. Carroll


This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and...

Parution : 2014-06-28
Format(s) : PDF sans DRM
J'achète
57,97
Télécharger le livre :  Computers, Business, and Security
Ajouter à ma liste d'envies

Computers, Business, and Security


James A Schweitzer


Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the...

Parution : 2014-05-20
Format(s) : PDF sans DRM
J'achète
26,32
Télécharger le livre :  Computer Security
Ajouter à ma liste d'envies

Computer Security


John M. Carroll


Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and...

Parution : 2014-05-20
Format(s) : PDF sans DRM
J'achète
57,97
Télécharger le livre :  The Art of Investigative Interviewing
Ajouter à ma liste d'envies

The Art of Investigative Interviewing


Inge Sebyan Black


The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative...

Parution : 2013-12-27
Format(s) : epub sans DRM
J'achète
48,48
Télécharger le livre :  Security and Loss Prevention
Ajouter à ma liste d'envies

Security and Loss Prevention


Philip Purpura


The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book's backbone, and Philip Purpura continues this strong...

Parution : 2013-01-18
Format(s) : epub sans DRM
J'achète
49,57
Télécharger le livre :  Cyber Attacks
Ajouter à ma liste d'envies

Cyber Attacks


Edward Amoroso


Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume...

Parution : 2012-03-29
Format(s) : epub sans DRM
J'achète
42,19
Télécharger le livre :  Security Convergence
Ajouter à ma liste d'envies

Security Convergence


Dave Tyson


Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing...

Parution : 2011-04-08
Format(s) : PDF sans DRM
J'achète
45,31
Télécharger le livre :  Electronic Security Systems
Ajouter à ma liste d'envies

Electronic Security Systems


Robert Pearson


Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses...

Parution : 2011-04-01
Format(s) : PDF sans DRM
J'achète
51,64
Télécharger le livre :  Integrated Security Systems Design
Ajouter à ma liste d'envies

Integrated Security Systems Design


Thomas L. Norman


Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security...

Parution : 2011-04-01
Format(s) : epub sans DRM
J'achète
50,59
Télécharger le livre :  Cyber Attacks
Ajouter à ma liste d'envies

Cyber Attacks


Edward Amoroso


Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national...

Parution : 2010-12-20
Format(s) : epub sans DRM
J'achète
48,48
Télécharger le livre :  Understanding Mobile Human-Computer Interaction
Ajouter à ma liste d'envies

Understanding Mobile Human-Computer Interaction


Steve Love


Taking a psychological perspective, this book examines the role of Human-Computer Interaction in the field of Information Systems research. The introductory section of the book covers the basic tenets of the HCI discipline, including how it developed and an overview of...

Parution : 2005-09-09
Format(s) : PDF sans DRM
J'achète
45,31
12 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés