Title search results
Showing 1 - 3 of 3 items
Building a cyber risk management program: Evolving security for the digital age
By Brian Allen. 2024
DAISY audio (CD), DAISY audio (Direct to player), DAISY audio (Zip)
Computers and internet, Business and economics
Human-narrated audio
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseA history of the world in twelve shipwrecks
By David Gibbins. 2024
DAISY audio (CD), DAISY audio (Direct to player), DAISY audio (Zip)
General non-fiction, History, Archaeology
Human-narrated audio
The Viking warship of King Cnut the Great. Henry VIII's the Mary Rose. Captain John Franklin's doomed HMS Terror. The…
SS Gairsoppa, destroyed by a Nazi U-boat in the Atlantic during World War II. Since we first set sail on the open sea, ships and their wrecks have been an inevitable part of human history. Archaeologists have made spectacular discoveries excavating these sunken ships, their protective underwater cocoon keeping evidence of past civilizations preserved. World renowned maritime archeologist David Gibbins ties together the stories of some of the most significant shipwrecks in time to form a single overarching narrative of world history. A History of the World in Twelve Shipwrecks is not just the story of those ships, the people who sailed on them, and the cargo and treasure they carried, but also the story of the spread of people, religion, and ideas around the world; it is a story of colonialism, migration, and the indominable human spirit that continues today. Drawing on decades of experience, Gibbins reveals the riches beneath the waves and shows us how the treasures found there can be a porthole to the past that tell a new story about the world and its underwater secrets
DAISY audio (CD), DAISY audio (Direct to player), DAISY audio (Zip)
Computers and internet, Personal finance and investing
Human-narrated audio
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals