Tipo de Livro
-Autor
-Editora
-Ano de Publicação
-Cidade
+Sebos e Livreiros
+Preço
+Categoria
+Idioma
+Avaliação
+Compra Corporativa
+Exibindo: 45 - 88 de 129 resultados

Livro ISO 50001
Reduce energy costs and combat climate change with ISO 50001ISO 50001:2018, the international standard for energy management, provides a framework for organisations both large and small to manage and reduce their energy usage and associated costs. Implementing an effective EnMS (energy management system) that complies with ISO 50001 ensures that an organisation can:Meet legal and contractual ene...
2019
1 novo
R$ 155,28

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro Two-Factor Authentication
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if its lost or stolen, its entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatical...
2015
1 novo
R$ 223,07

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro ISO 37001
When is a gift not a gift? When its a bribe.For many, corporate hospitality oils the wheels of commerce. But where do you draw the line?Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts, and hospitality can all be used to influence business partners, clients, and contractors.Can you afford...
2017
1 novo
R$ 156,03

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro Insider Threat
Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors hands.Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or...
2016
1 novo
R$ 538,92

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30

Livro ISO/IEC 27701
An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enabling an organisation...
2020
1 novo
R$ 152,30