Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Getting Started with Raspberry Pi Zero
Getting Started with Raspberry Pi Zero

Key Features

  • Get started with Raspberry Pi Zero and put all of its exciting features to use
  • Create fun games and programs with little or no programming experience
  • Learn to use this super-tiny PC to control hardware and software for work, play, and everything else

Book...

Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Get ready to be an effective digital leader, influencer, disruptor, and catalyst for change in the digital world!

As a leader you need to constantly evolve to achieve sustained success. The world is being transformed by Digital. The pace of change is constantly accelerating and volatility and complexity are the
...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Unleashing Your Leadership Potential: Seven Strategies for Success
Unleashing Your Leadership Potential: Seven Strategies for Success

Unleashing Your Leadership Potential provides the means to unleash the unique capital of leadership inherent in each of us, making it possible for teams, organizations, and society to improve the lives of others while we improve our own. Luc's leadership model is based on case studies and interviews with leaders, providing insights...

Debugging the Development Process
Debugging the Development Process
This book might make Microsoft sound bad.

At least that's one of the concerns I had about telling so many Microsoft war stories. I considered softening and smoothing over some of the stories, or leaving them out altogether, but apart from changing people's names, I decided to keep this book and its examples grounded in reality so that it
...
Great Big Agile: An OS for Agile Leaders
Great Big Agile: An OS for Agile Leaders
Big Agile leaders need an empirical, "high-trust" model that provides guidance for scaling and sustaining agility and capability throughout a modern technology organization. This book presents the Agile Performance Holarchy (APH)?a "how-ability" model that provides agile leaders and teams with an operating system to...
Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work
Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work

Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work is the first book on the subject for smaller businesses.

Until now, design thinking—a methodology for solving business problems and identifying opportunities—has been the playground for companies with big budgets,
...

Analysis and Design of Information Systems
Analysis and Design of Information Systems
In any software design project, the analysis stage - documenting and designing technical requirements for the needs of users - is vital to the success of the project.

This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business...

Creating a Data-Driven Organization
Creating a Data-Driven Organization

What do you need to become a data-driven organization? Far more than having big data or a crack team of unicorn data scientists, it requires establishing an effective, deeply-ingrained data culture. This practical book shows you how true data-drivenness involves processes that require genuine buy-in across your company, from analysts...

Design Thinking Business Analysis: Business Concept Mapping Applied (Management for Professionals)
Design Thinking Business Analysis: Business Concept Mapping Applied (Management for Professionals)

​This book undertakes to marry the concepts of "Concept Mapping" with a "Design Thinking" approach in the context of business analysis. While in the past a lot of attention has been paid to the business process side, this book now focusses information quality and valuation, master data and hierarchy management,...

Result Page: 43 42 41 40 39 38 37 36 35 34 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy