Back to TopBack to Top
Buyezee Österreich
Österreich
Buyezee Canada
Canada
Buyezee France
France
Buyezee Deutschland
Deutschland
Buyezee Indonesia
Indonesia
Buyezee Italia
Italia
Buyezee Morocco
Morocco
Buyezee Nederland
Nederland
Buyezee Philippines
Philippines
Buyezee Россия
Россия
Buyezee España
España
Buyezee Schweiz
Schweiz
Buyezee Thailand
Thailand
Buyezee United Kingdom
United Kingdom
Buyezee United States
United States
Buyezee Việt Nam
Việt Nam
Close
United States United States
My Favourites My Favourites (0)
Favourite Added! Favourites Updated!

security

Show this merchant
From $14.74
Show this merchant
From $14.99
Show this merchant
From $17.35
Show this merchant
From $16.41
Show this merchant
From $17.99
Show this merchant
From $19.19
Show this merchant
From $18.99
Show this merchant
From $19.99
Show this merchant
From $19.98
Show this merchant
From $21.48
Show this merchant
From $23.99
Show this merchant
From $26.84
Show this merchant
From $29.99
Show this merchant
From $79.99
Show this merchant
From $82.00
$14
$37,958
  • Information Security Breaches
    https://kbimages1-a.akamaihd.net/Images/3361051a-9905-4ac3-885e-281f5ea12f68/120/185/False/information-security-breaches.jpg

    Information Security Breaches

    If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
  • The Hacker Playbook 2
    https://kbimages1-a.akamaihd.net/Images/3603b268-1104-4665-82e2-4a6c18922a7f/120/185/False/the-hacker-playbook-2.jpg

    The Hacker Playbook 2

    Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.
  • PSP-Concealed-Carry-Belly-Band-Holster-Natural-Medium/Large
    http:////cdn.gandermountain.com/product2/219/219733_L1.jpg?interpolation=lanczos-none&downsize=450px:*
  • PSP-Concealed-Carry-Belly-Band-Holster-Black-Small/Medium
    http:////cdn.gandermountain.com/product2/219/219730_L1.jpg?interpolation=lanczos-none&downsize=450px:*
  • Simulated Security Camera Set of 2
    https://lppool.catalogsites.net/lf?set=type[1],brand[WW],size[150],productid[KB8241GH]&call=url[file:potpourri/hires.chain]

    Simulated Security Camera Set of 2

    Fake Security Camera Looks and Acts Like the Real Thing! This mock dome camera features a motion-activated LED light that flashes red, as if it''s actually recording! An easy way to add security to your home or business. Can be used indoors or out. Mounts easily with included hardware. High-impact plastic. Uses 2 AA batteries (not included). 4 ?''W x 3''H.
  • PSP-Concealed-Carry-Belly-Band-Holster-Natural-Small/Medium
    http:////cdn.gandermountain.com/product2/219/219732_L1.jpg?interpolation=lanczos-none&downsize=450px:*
  • Secur SP-1001 Waterproof Dynamo LED Flashlight
    https://cdn7.bigcommerce.com/s-ljboqq8dd6/images/stencil/1000x1000/products/585/3265/SP-1001_1__34224__47771.1515182554.jpg?c=2

    Secur SP-1001 Waterproof Dynamo LED Flashlight

    The Secur SP-1001 Waterproof Dynamo LED Flashlight is a must-have in an emergency situation. With its hand-powered dynamo charging, youll never worry about running out of light when you need it most. And its waterproof casing (down to a depth of 45 feet) means never having to worry about foul-weather performance -- or about dropping your light source into a puddle or a stream. The useful lighting time on a full charge is approximately 4 hours using three of the flashlights LEDs or 8 hours using only one LED; Plus, just 1 minute of cranking the dynamo lights one LED for up to 80 minutes. With 8 lumens of light and a lifetime 50,000 hours of use, this pocket flashlight will serve as a trusted emergency light source for years to come.
  • Fundamentals of Information Risk Management Auditing
    https://kbimages1-a.akamaihd.net/Images/cfa46930-7065-4a76-8cce-07a35ac2c1fb/120/185/False/fundamentals-of-information-risk-management-auditing.jpg

    Fundamentals of Information Risk Management Auditing

    An introductory guide to information risk management auditing, giving an interesting and useful insight into the risks and controls/mitigations that you may encounter when performing or managing an audit of information risk. Case studies and chapter summaries impart expert guidance to provide the best grounding in information risk available for risk managers and non-specialists alike.
  • CCTV Male Power Lead Cable Connector for Security Cameras
    http://images10.newegg.com/ProductImageCompressAll200/ABS3_1_201706301116114339.jpg

    CCTV Male Power Lead Cable Connector for Security Cameras

    CCTV Male Power Lead Cable Connector for Security Cameras
  • Mobile Security
    https://kbimages1-a.akamaihd.net/Images/3fcd9273-a03e-47c5-a873-f55f72ad2585/120/185/False/mobile-security-1.jpg

    Mobile Security

    This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone. Written by one of the country's top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private network (VPN) to create a secure way for your staff to connect to the server on a remote device, and countering the growing threat on mobile platforms of SMS-phishing and malware. Rather than trying to ban the Blackberry, the solution proposed is for organisations to factor mobile devices into their overall information security policy.
  • IT Induction and Information Security Awareness
    https://kbimages1-a.akamaihd.net/Images/7ce15599-eac0-4dd9-9be2-c8aade9792ae/120/185/False/it-induction-and-information-security-awareness-1.jpg

    IT Induction and Information Security Awareness

    If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention. Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company's information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company's information security and reduce the risk that your data will be stolen or lost.
  • IT Induction and Information Security Awareness
    https://kbimages1-a.akamaihd.net/Images/03c49581-cd2f-477b-a24c-5ee2c01f2f69/120/185/False/it-induction-and-information-security-awareness.jpg

    IT Induction and Information Security Awareness

    If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention. Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company's information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company's information security and reduce the risk that your data will be stolen or lost.
  • The Chief Information Security Officer
    https://kbimages1-a.akamaihd.net/Images/9f5cb6ff-f350-45f3-a786-a4a3003daeaa/120/185/False/the-chief-information-security-officer-1.jpg

    The Chief Information Security Officer

    The serious and ever-changing nature of today's security threats demand a strategic-minded response, and a successful CISO will always be thinking about how to gain business objectives through enabling technology while properly managing risk. This pocket guide emphasises the importance of a suitable information security management system (ISMS) and the risk management methodolgy that should be at its heart.
  • An Introduction to Information Security and ISO27001:2013
    https://kbimages1-a.akamaihd.net/Images/bc561c82-6d07-4581-a527-5ff11af7c872/120/185/False/an-introduction-to-information-security-and-iso27001-2013.jpg

    An Introduction to Information Security and ISO27001:2013

    The main international standard that deals with information security is ISO27001. If your organisation is looking to raise employee awareness of information security, then you will find this book especially useful. The pocket guide explains the concept of information security management within the framework of ISO27001.
  • The True Cost of Information Security Breaches and Cyber Crime
    https://kbimages1-a.akamaihd.net/Images/698b827d-c78d-4e18-94e8-3fa741ba0047/120/185/False/the-true-cost-of-information-security-breaches-and-cyber-crime-1.jpg

    The True Cost of Information Security Breaches and Cyber Crime

    This pocket guide uses case studies to illustrate the possible security breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
  • Information Security Breaches
    https://kbimages1-a.akamaihd.net/Images/f2c89fba-7dd6-45b9-95b3-7a48cc4a8212/120/185/False/information-security-breaches-avoidance-and-treatment-based-on-iso27001-1.jpg

    Information Security Breaches

    How would your business respond to an information security breach? If you are running a business, you learn to expect the unexpected. Even if you have taken all the right precautions, your company might still find itself confronted with an information security breach. How would your business cope then? There are lots of books that will tell you what to do to prevent an information security breach. This book is different. It tells you what you have to do if a security breach occurs. Security breaches sometimes occur because computers containing sensitive information are not returned to their owners. NATO laptops have been spotted in flea markets, and US government computers were put up for sale on Ebay. Security breaches may also be the result of data theft. A bad apple in your company may be tempted to sell your confidential data to a rival firm. If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
  • Security
    https://kbimages1-a.akamaihd.net/Images/47fcd6b7-2580-45ff-90cf-47641115f486/120/185/False/security-13.jpg

    Security

    This guide looks at the human challenges associated with information security. It assesses the consequences of failing to meet them and - most importantly - looks at the steps organisations can take to make themselves and their information more secure.
  • Mobile Security
    https://kbimages1-a.akamaihd.net/Images/874dcd37-d4e3-495b-b3af-323dfe675f78/120/185/False/mobile-security-2.jpg

    Mobile Security

    This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone. Written by one of the country's top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private network (VPN) to create a secure way for your staff to connect to the server on a remote device, and countering the growing threat on mobile platforms of SMS-phishing and malware. Rather than trying to ban the Blackberry, the solution proposed is for organisations to factor mobile devices into their overall information security policy.
  • Franzen Security Gun Combination Trigger Lock, Universal
    http://ih.atensoftware.com/38432/franzen-security-gun-combination-trigger-lock-universal.jpg

    Franzen Security Gun Combination Trigger Lock, Universal

    Franzen Security Gun Combination Trigger Lock, Universal
  • CCTV Female Power Lead Cable Connector for Security Cameras
    http://images10.newegg.com/ProductImageCompressAll200/ABS3_1_201706301357274203.jpg

    CCTV Female Power Lead Cable Connector for Security Cameras

    CCTV Female Power Lead Cable Connector for Security Cameras
  • management of information security
    http://www0.alibris-static.com/isbn/9781285062297.gif

    management of information security

    Very Good Text may contain some highlighting. Order shipped same day if if rec'd by 1PM CST, otherwise ships the next business day. Great Customer Service.
  • How to Land a Top-Paying Information systems security analysts Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More
    https://kbimages1-a.akamaihd.net/Images/b12f8055-b518-4f1f-98d3-f29b74f1b86d/120/185/False/how-to-land-a-top-paying-information-systems-security-analysts-job-your-complete-guide-to-opportunities-resumes-and-cover-letters-interviews-salaries-promotions-what-to-expect-from-recruiters-and-more.jpg

    How to Land a Top-Paying Information systems security analysts Job: Your Complete Guide to Opportuni

    For the first time, a book exists that compiles all the information candidates need to apply for their first Information systems security analysts job, or to apply for a better job. What you'll find especially helpful are the worksheets. It is so much easier to write about a work experience using these outlines. It ensures that the narrative will follow a logical structure and reminds you not to leave out the most important points. With this book, you'll be able to revise your application into a much stronger document, be much better prepared and a step ahead for the next opportunity. The book comes filled with useful cheat sheets. It helps you get your career organized in a tidy, presentable fashion. It also will inspire you to produce some attention-grabbing cover letters that convey your skills persuasively and attractively in your application packets. After studying it, too, you'll be prepared for interviews, or you will be after you conducted the practice sessions where someone sits and asks you potential questions. It makes you think on your feet! This book makes a world of difference in helping you stay away from vague and long-winded answers and you will be finally able to connect with prospective employers, including the one that will actually hire you. This book successfully challenges conventional job search wisdom and doesn't load you with useful but obvious suggestions ('don't forget to wear a nice suit to your interview,' for example). Instead, it deliberately challenges conventional job search wisdom, and in so doing, offers radical but inspired suggestions for success. Think that 'companies approach hiring with common sense, logic, and good business acumen and consistency?' Think that 'the most qualified candidate gets the job?' Think again! Time and again it is proven that finding a job is a highly subjective business filled with innumerable variables. The triumphant jobseeker is the one who not only recognizes these inconsistencies and but al
  • CISSP Certified Information Systems Security Professional Certification Exam Preparation Course in a Book for Passing the CISSP Certified Information Systems Security Professional Exam - The How To Pass on Your First Try Certification Study Guide
    https://kbimages1-a.akamaihd.net/Images/9b10dd42-c9f5-4a63-b61d-a56b079c0657/120/185/False/cissp-certified-information-systems-security-professional-certification-exam-preparation-course-in-a-book-for-passing-the-cissp-certified-information-systems-security-professional-exam-the-how-to-pass-on-your-first-try-certification-study-guide.jpg

    CISSP Certified Information Systems Security Professional Certification Exam Preparation Course in a

    This self-study exam preparation guide for the CISSP Certified Information Systems Security Professional certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CISSP Certified Information Systems Security Professional subjects, test tricks and tips, numerous highly realistic sample questions, and exercises designed to strengthen understanding of CISSP Certified Information Systems Security Professional concepts and prepare you for exam success on the first attempt are provided. CISSP certification reflects the qualifications of information systems security practitioners. The CISSP examination consists of 250 multiple choice questions, covering 10 domains of information security and is administered by the International Information Systems Security Certification Consortium. Can you imagine valuing a book so much that you send the author a "Thank You" letter? Tens of thousands of people understand why this is a worldwide best-seller. Is it the authors years of experience? The endless hours of ongoing research? The interviews with those who failed the exam, to identify gaps in their knowledge? Or is it the razor-sharp focus on making sure you don't waste a single minute of your time studying any more than you absolutely have to? Actually, it's all of the above. This book includes new exercises and sample questions never before in print. Offering numerous sample questions, critical time-saving tips plus information available nowhere else, this book will help you pass the CISSP Certified Information Systems Security Professional exam on your FIRST try. Up to speed with the theory? Buy this. Read it. And Pass the CISSP Certified Information Systems Security Professional Exam.
  • 18M CCTV Camera DVR Video DC Power Security BNC RCA Cable Monitor Wire System
    http://images10.newegg.com/ProductImageCompressAll200/AE78_1_201803051945395776.jpg

    18M CCTV Camera DVR Video DC Power Security BNC RCA Cable Monitor Wire System

    18M CCTV Camera DVR Video DC Power Security BNC RCA Cable Monitor Wire System
  • readings and cases in information security law and ethics
    http://www0.alibris-static.com/isbn/9781435441576.gif

    readings and cases in information security law and ethics

    Good 1435441575 Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
  • fundamentals of information systems security standalone book
    http://www0.alibris-static.com/isbn/9781284031621.gif

    fundamentals of information systems security standalone book

    Good 1284031624 Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
  • Datamation DS6SCKUSFF780 Optiplex 780 USFF Security Cable Kit
    http://www.techforless.com/cimages/309111.JPG

    Datamation DS6SCKUSFF780 Optiplex 780 USFF Security Cable Kit

    Ensure the safety of your Dell Optiplex 780 USFF Desktop Computer with the Security Cable Kit from Datamation Systems. This security cable kit incorporates a 6 feet, 1 4 inch vinyl coated thick galvanized steel.
  • The Chief Information Security Officer: Insights, tools and survival skills
    https://kbimages1-a.akamaihd.net/Images/75f46bca-df87-4140-992c-50c63fbbd38a/120/185/False/the-chief-information-security-officer-insights-tools-and-survival-skills.jpg

    The Chief Information Security Officer: Insights, tools and survival skills

    This guide describes the hard and soft skills that a successful CISO requires. Emphasising the importance of a suitable Information Security Management System (ISMS) and the risk management methodology that should be at its heart, it explains the changing goals of the information security department.
  • Security 12 Volt 5 Amp Power Supply Power Adapter for CCTV Security Cameras (Output: DC 12V 5A)
    http://litbimg.rightinthebox.com/images/m/201310/nxrjsp1383102633301.jpg
  • Secur SP-4000 Mini Auto Emergency Tool
    https://cdn7.bigcommerce.com/s-ljboqq8dd6/images/stencil/1000x1000/products/695/3473/SP-4000_1__83679__38461.1515181939.jpg?c=2

    Secur SP-4000 Mini Auto Emergency Tool

    Dont get behind the wheel without the Secur SP-4000 Mini Auto Emergency Tool. With three essential functions, it will always be the first thing youll reach for in an emergency. The window breaker lets you safely shatter a window and escape dangerous situations. The seat belt cutter keeps the seat belt from trapping you after an accident. And the super bright LED flashlight is dynamo-powered, so it never needs batteries. Just one minute of cranking keeps the flashlight glowing continuously for approximately 10 minutes. When fully charged, the light will last for about 80 minutes, or up to seven hours in emergency flashing mode.
  • Social Security For Dummies
    https://kbimages1-a.akamaihd.net/Images/a90319d5-d724-4401-8371-9f9d52330017/120/185/False/social-security-for-dummies-3.jpg

    Social Security For Dummies

    Get the benefits you've earnedSocial Security For Dummies is the one guide you need to navigate the often-complex world of Social Security retirement benefits. This updated edition offers clear guidance on when to claim benefits, how much you can expect to receive, where to find Social Security calculators, and so much more. Since its inception in the 1930s, workers across the United States have set aside a portion of their wages to fund the Social Security Administration. For many, Social Security forms the foundation for their retirement funds. Social Security For Dummies provides you with all the information you need to take charge of your retirement, maximize your financial well-being, and successfully navigate the U.S. Social Security Administration. You'll get up-to-date information to: Make your way around the Social Security websiteKnow your Social Security options-including retirement, survivor, spousal, and disability benefitsFind resources when you're stumpedGet answers to common questionsRetirement is meant to be enjoyed, and Social Security For Dummies makes it easier.
  • Sony Security NVR-CARRIER Hard Disk Drive Carrier
    http://www.101phones.com/images/CatalogItemVariation/68274/Sony-Security-NVR-CARRIER-Hard-Disk-Drive-Carrier-img1.jpg

    Sony Security NVR-CARRIER Hard Disk Drive Carrier

    "Sony NVR-CARRIER Brand New, The Sony NVR-CARRIER is a removable tray designed to safely store a hard drive used for storage expansion of the Sony Network Surveillance Server. NVR-CARRIER Features: Hard Drive Carrier, Removable Tray, For Securely Storing Hard Drive, Used w/ Network Surveillance Server"
  • Sony Security NVR-CARRIER Hard Disk Drive Carrier
    http://sny.factoryoutletstore.com/images/CatalogItemVariation/68274/Sony-Security-NVR-CARRIER-Hard-Disk-Drive-Carrier-img1.jpg

    Sony Security NVR-CARRIER Hard Disk Drive Carrier

    "Sony NVR-CARRIER Brand New, The Sony NVR-CARRIER is a removable tray designed to safely store a hard drive used for storage expansion of the Sony Network Surveillance Server. NVR-CARRIER Features: Hard Drive Carrier, Removable Tray, For Securely Storing Hard Drive, Used w/ Network Surveillance Server"
  • Sony Security NVR-CARRIER Hard Disk Drive Carrier
    http://sony.onlinephonestore.com/images/CatalogItemVariation/68274/Sony-Security-NVR-CARRIER-Hard-Disk-Drive-Carrier-img1.jpg

    Sony Security NVR-CARRIER Hard Disk Drive Carrier

    "Sony NVR-CARRIER Brand New, The Sony NVR-CARRIER is a removable tray designed to safely store a hard drive used for storage expansion of the Sony Network Surveillance Server. NVR-CARRIER Features: Hard Drive Carrier, Removable Tray, For Securely Storing Hard Drive, Used w/ Network Surveillance Server"
  • Information Security Breaches: Avoidance and Treatment based on ISO27001
    https://kbimages1-a.akamaihd.net/Images/97e8bcd8-d2a0-4419-bac5-380ca749489e/120/185/False/information-security-breaches-avoidance-and-treatment-based-on-iso27001-2.jpg

    Information Security Breaches: Avoidance and Treatment based on ISO27001

    If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be able to isolate the suspect devices right from the start. This pocket guide tells you what you have to do if a security breach occurs, detailing the plans and procedures you need to put in place. In particular, it gives clear guidance on how to treat an information security breach in accordance with ISO27001:2013
  • The True Cost of Information Security Breaches and Cyber Crime
    https://kbimages1-a.akamaihd.net/Images/2d2a85e7-bac3-4509-875c-73c2de39a75f/120/185/False/the-true-cost-of-information-security-breaches-and-cyber-crime.jpg

    The True Cost of Information Security Breaches and Cyber Crime

    This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
  • basics of information security understanding the fundamentals of infosec in
    http://www0.alibris-static.com/isbn/9781597496537.gif

    basics of information security understanding the fundamentals of infosec in

    Good 1597496537 Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
  • A Dictionary of Information Security Terms, Abbreviations and Acronyms
    https://kbimages1-a.akamaihd.net/Images/5c62e3f9-1b08-4307-b569-323cbaab915b/120/185/False/a-dictionary-of-information-security-terms-abbreviations-and-acronyms.jpg

    A Dictionary of Information Security Terms, Abbreviations and Acronyms

    This Dictionary is an invaluable resource for people grappling with security terminology for the first time. Rather than a dry technical dictionary, the book is written in an accessible style that enables managers and novices to quickly grasp the meaning
  • CISSP 100 Success Secrets: Certified Information Systems Security Professional; The Missing Exam Study, Certification Preparation and Security Applica
    https://kbimages1-a.akamaihd.net/Images/07884074-d46c-48db-81a8-7f2a1dd86e10/120/185/False/cissp-100-success-secrets-certified-information-systems-security-professional-the-missing-exam-study-certification-preparation-and-security-applica.jpg

    CISSP 100 Success Secrets: Certified Information Systems Security Professional; The Missing Exam Stu

    Addresses the top 100 consultancy & education forum questions, with tips & success factors on investigating, evaluating, attaining & capitalising on Certified Information Systems Security Professional (CISSP) IT certification.
  • 420TVL CCTV Color Dome Security Camera Cmos Indoor IR
    http://miniimg.rightinthebox.com/images/m/201108/ggaxrx1313638125166.jpg
  • New School of Information Security, The
    http://www.informit.com/ShowCover.aspx?isbn=9780132800280&type=d
  • The Psychology of Information Security
    https://kbimages1-a.akamaihd.net/Images/64e3a2cf-fbae-4c3a-a0bf-d5eb15903d36/120/185/False/the-psychology-of-information-security.jpg

    The Psychology of Information Security

    This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronizing or prescriptive, making it an easy read with some very real practical takeaways.
  • Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/47da8337-c884-4947-a58b-2e5a1fd0ef6d/120/185/False/business-driven-information-systems-6.jpg

    Business Driven Information Systems

    Facts101 is your complete guide to Business Driven Information Systems. In this book, you will learn topics such as Ebusiness: Electronic Business Value, Ethics and Information Security: MIS Business Concerns, Infrastructures: Sustainable Technologies, and Data: Business Intelligence plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Information Systems
    https://kbimages1-a.akamaihd.net/Images/20346c24-e4c3-4a63-ad4f-525da5c78285/120/185/False/information-systems-3.jpg

    Information Systems

    Facts101 is your complete guide to Information Systems. In this book, you will learn topics such as Ebusiness: Electronic Business Value, Ethics + Information Security: MIS Business Concerns, Infrastructures: Sustainable Technologies, and Data: Business Intelligence plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Security Analysis
    https://kbimages1-a.akamaihd.net/Images/a75f3a82-bf01-4b39-bb8b-c838432388cf/120/185/False/security-analysis-1.jpg

    Security Analysis

    Facts101 is your complete guide to Security Analysis. In this book, you will learn topics such as Blood and Judgement, Go with the Flow, The Quest for Rational Investing, and Deconstructing the Balance Sheet plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Essentials of Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/bb936561-db14-44f2-874b-57828fc1cca2/120/185/False/essentials-of-business-driven-information-systems.jpg

    Essentials of Business Driven Information Systems

    Facts101 is your complete guide to Essentials of Business Driven Information Systems. In this book, you will learn topics such as E-Business, Ethics and Information Security, IT Architectures, and Databases and Data Warehouses plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Security in Computing
    https://kbimages1-a.akamaihd.net/Images/568cfce1-b120-4159-9028-433ef61dad11/120/185/False/security-in-computing-4.jpg

    Security in Computing

    Facts101 is your complete guide to Security in Computing. In this book, you will learn topics such as Program Security, Protection in General-Purpose Operating Systems, Designing Trusted Operating Systems, and Database and Data Mining Security plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Accounting Information Systems
    https://kbimages1-a.akamaihd.net/Images/d32e992f-f779-40a7-9feb-eb3e40804e51/120/185/False/accounting-information-systems-13.jpg

    Accounting Information Systems

    Facts101 is your complete guide to Accounting Information Systems. In this book, you will learn topics such as eBusiness and eCommerce, Transaction Processing and the Internal Control Process, Information Security, and Electronic Data Processing Systems plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/fae6da92-d210-40bb-a3af-e610a815fa83/120/185/False/business-driven-information-systems-4.jpg

    Business Driven Information Systems

    Facts101 is your complete guide to Business Driven Information Systems. In this book, you will learn topics such as Ebusiness, Ethics and Information Security, Enterprise Architectures, and Databases and Data Warehouses plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/7d233625-87e8-4e4d-a81e-20b513012db1/120/185/False/business-driven-information-systems-5.jpg

    Business Driven Information Systems

    Facts101 is your complete guide to Business Driven Information Systems. In this book, you will learn topics such as Ebusiness: Electronic Business Value, Ethics and Information Security: MIS Business Concerns, Infrastructures: Sustainable Technologies, and Data: Business Intelligence plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
Loading products...
Loading more results...