 |
|
|
|
 Usability: Turning Technologies into Tools"The book contains much insight." --B. Hazeltine, Computing Reviews "Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of... |  |  Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding... |  |  Complete Guide to CISM CertificationComplete Guide to CISMЮ Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,... |
|
|
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 |