Provides an overview of basic information security practices that will enable your security team to better engage with t
267 27 844KB
English Pages 116 Year 2015
Report DMCA / Copyright
DOWNLOAD FILE
This book provides theoretical clarity about the concepts of failed and fragile states, which have emerged strongly sinc
207 31 1MB Read more
This collection of articles is the first attempt by academics and professional writers to delve into the world of conten
164 61 14MB Read more
Imagining the healthcare of the future is an interesting exercise, and although nobody can predict precisely what system
610 67 5MB Read more
This book examines the issue of the recognition of Islamic divorces in European states. Repudiation-based divorces are p
118 7 2MB Read more
This book provides an overview of current research on the development of reading skills as well as practices to assist e
642 33 2MB Read more
This book addresses the topical question on how national and international environmental concerns could be adequately in
193 31 3MB Read more
How is it that the FBI, a domestic intelligence agency, operates beyond the US borders? What role does the bureau play i
197 79 2MB Read more
An oft-repeated assertion within contract law scholarship and cases is that a good contract law (or a good commercial co
98 10 1MB Read more
In the digital age, data is the new currency. However, amassing heaps of data means nothing if it doesn't lead to a
132 52 15MB Read more
New core text for Managing Information modules examining the issue of information management from both a business and an
105 105 40MB Read more