You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to underst...
This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.
This pocket guide provides an introduction on how to approach the complex subject of IT governance. It describes the drivers for IT governance: why it matters, and the relationships between IT governance, risk management, information risk, project governance and compliance risk.
Studies have shown that a company's share price is often linked to how well governed the company is, providing board members with a strong financial incentive to maintain good corporate governance practices. Yet what may constitute good governance will vary across different countries and companies, and there is no 'one size fits all' model of corporate governance. Corporate Governance will help you to become familiar with the principles and practice of good governance appropriate to your company, enabling you to uphold those standards that will improve your corporate reputation while providing reassurance to market regulators. For directors of companies of all shapes and sizes, this is essential reading, and will answer all your questions on what good corporate governance means for you, your company's reputation and its share price.
Ted Bunpole proposes, and Betty Haverhill says no. But Ted won't take "no" for an answer, and the situation gets tiresome. Betty books passage to Europe by freighter. The Garda departs San Francisco for Italy, via the Panama Canal. Passengers include the intellectual Alex Cato and his wife Ora; Nello di Prieri, whose father is a Marquis; plump Harry Mayberry, owner of a dry-cleaning plant in Oakland-and the formidable, cigar-smoking Mik Finsch, a Dutchman recently from El Salvador. And who but the dogged Ted Bunpole-following Betty despite her clear wishes? In desperation, Betty flirts with Mik Finsch; Ted loses his head, and sinister events follow. In San Salvador, Betty witnesses a killing. With the Garda back at sea, the killer is on the ship-and her life is in danger... But Betty is no pushover.
Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software.
Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives.
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market route...
From Aesthetes in Africa to the cultural history of the teapot, the essays in this collection contribute to scholarly debates across a wide range of disciplines. Addressing the question of whether "eclectic" relationships in Victorian decorative arts are actually self-conscious iconographic schemes or merely random juxtapositions of assorted objects, Rethinking the Interior, c. 1867-1896: Aestheticism and Arts and Crafts, argues that no firm demarcation exists between the two movements examined here. In the process, the contributors explore a wide variety of interiors in locations as diverse as London, Cornwall, New England, and Tangiers. Analyzing spaces public and private, sacred and secular, the volume poses several historiographic challenges. Drawing on a wide range of feminist and queer theories, the book questions the identification of nineteenth-century interiors as exclusively female or family spaces. The collection also addresses the complex and temporary character of interiors, and responds to the recent scholarly trend to return questions of feeling and embodied experience to the study of the decorative arts.
The book intends to present a critique of some select, 21st Century, hard science fiction novels in order to explicate the various ways in which the elements of posthumanism, transhumanism, techno-singularity intersect and interact with other such ideas as monstrosity, animality, machinicity, post-anthropocentrism, and Anthropocene. The study divides its analysis into seven different chapters and attempts to present an elaborate study on various aspects of posthumanism, transhumanism, and singularity. The book despite being a collection of miscellaneous essays actually intends to show how a technologically mediated transhuman/posthuman culture will normally be defined by a total dissolution ...