Zustand: Good. Good condition ex-library book with usual library markings and stickers.
Sprache: Englisch
Verlag: O'Reilly Media, Incorporated, 2021
ISBN 10: 149207621X ISBN 13: 9781492076216
Anbieter: Better World Books: West, Reno, NV, USA
Zustand: Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Zustand: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp.
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
EUR 33,93
Anzahl: 3 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 43,39
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 225 pages. 9.25x6.25x0.50 inches. In Stock.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 50,43
Anzahl: 3 verfügbar
In den WarenkorbZustand: New. pp. 225.
Anbieter: Gallix, Gif sur Yvette, Frankreich
Zustand: Neuf.
Zustand: New. 2021. Paperback. . . . . . Books ship from the US and Ireland.
EUR 35,94
Anzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New. InfoSec professionals frequently struggle to integrate security into their companies processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager s guide offers a new approach to buildin.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - 'InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations; most are under-resourced. This essential manager's guide offers a new seven-step approach to building and maintaining an information security program that's both effective and easy to follow. Includes advice on building relationships across your organization; aligning your role with your company's values and culture; creating a communications program to share and educate; and measuring your company's ability to recognize and report security policy violations and phishing attempts'--Publisher's description.