Catalog Search Results
Author
Series
Language
English
Appears on these lists
Formats
Description
"Part of the nonfiction Orca Footprints series for middle-grade readers, this book examines the importance of seeds to all living things, the threats they face and why we have to preserve and conserve seeds for the future. Illustrated with photographs throughout."--
Author
Pub. Date
2023.
Language
English
Description
"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--
Pub. Date
2024.
Language
English
Description
The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses...
Author
Pub. Date
2023.
Language
日本語
Description
"Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and...
Author
Pub. Date
[2023]
Language
English
Description
After mounting red flags caused Chris Smith to end a close relationship, he found his digital life under attack: accounts were compromised, emails and texts were intercepted, his social security number was stolen, and his mother's home Wi-Fi router was breached. Chris would soon learn that cybercriminals had targeted him in one of the most extensive, twisted cases of digital identity theft known known to experts. He discovered that he wasn't alone,...
Author
Pub. Date
2024
Language
English
Description
Take your organization's data maturity to the next level by operationalizing data governance Key Features Develop the mindset and skills essential for successful data stewardship Apply practical advice and industry best practices, spanning data governance, quality management, and compliance, to enhance data stewardship Follow a step-by-step program to develop a data operating model and implement data stewardship effectively Purchase of the print or...
Author
Pub. Date
2023.
Language
English
Description
Written and narrated by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. The guide is a must-have resource giving a clear, concise and easy-to-read introduction to information security.
Author
Pub. Date
2009.
Language
English
Description
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr.
Pub. Date
[2023]
Language
English
Description
Mavka the soul of the forest has been chosen by the supreme spirits to become the forest's new guardian. But when she meets a talented human musician named Lucas a man on the hunt for a mysterious tree with the power to give life, she is faced with an impossible choice between her newfound love and her duty to the spirits. Can humans and the forest live in harmony, or will greed and vice destroy them both?
Author
Pub. Date
[2024]
Language
English
Description
The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 is 31 March 2024. Many organisations around the world – particularly those that fall below the top tier of payment card transaction volumes – are not yet compliant with the new version. This book: Explains the fundamental concepts of PCI DSS v4.0; Is a perfect quick reference guide for PCI professionals, or a handy introduction...
11) Data for all
Author
Pub. Date
2023.
Language
English
Description
Do you know what happens to your personal data when you are browsing, buying, or using apps? Discover how your data is harvested and exploited, and what you can do to access, delete, and monetize it. Data for All empowers everyone--from tech experts to the general public--to control how third parties use personal data. Read this eye-opening book to learn: The types of data you generate with every action, every day Where your data is stored, who controls...
Author
Series
Pub. Date
[2022]
Language
English
Description
The first publication in the Create, Protect, and Deliver Digital Business value series sets out how the ever-changing threat landscape intersects with digital business risk. It introduces the Create, Protect, and Deliver (CPD) Model – a dynamic model of systems – to explain how any business value that is created must be protected at a level which is proportional to its value to the organization.
Author
Language
English
Description
A short story to be told to young children about an Enchanted Lake that was in danger of disappearing due to the human voracity that had contaminated its waters and allowed less and less water flow to pass through its feeder river.Due to the beautiful spirit that inhabited it, this sacred lake transmitted with its presence qualities of emotional and spiritual healing to all those who lived near it, plants, animals, and humans included.To make matters...
14) Toxic Tenacity
Author
Language
English
Description
During the first few months of the community's efforts, I viewed it as merely a public relations battle. I concentrated on becoming good at TV interviews. We seemed to get better as we progressed in the battle with the toxic dump site. But things changed after I went on a road trip home one afternoon from work! The events changed my view of the battle!
As I bounced along the country road, listening to country music, I noticed a large pick-up...
Author
Language
English
Description
This book follows the arc of an upland hunter's life from childhood into old age. Each chapter emphasizes the larger life lessons that hunting teaches a person as they learn and then practice the sport. A large portion of the book centers on the way upland hunting integrates wing shooting and dog work into a coherent whole that, when it works well, can approach art.
The book consists a Preface, 34 stories organized into seven sections (Growing Up,...
Author
Language
English
Description
In Conscious (R)Evolution, Humanity, Insanity, and the Planet, the author brings together two powerful insights: that all life on this planet is interconnected, and that humanity's current path of consumerism and industrialization is leading to catastrophe. From deforestation to pollution, we are damaging the very environment that sustains us. This book asks us to stop and consider the bigger picture: as an intelligent species, why would we willingly...
Author
Pub. Date
2014.
Language
English
Description
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on...
19) Cybersecurity for non-technical professionals: how to protect your personal and professional data
Pub. Date
[2023]
Language
English
Description
With cyber attacks on the rise, all individuals - and especially professionals handling potentially confidential company data - should be well-versed in how to protect their information from bad actors. This video will take you through the steps you can take to protect both your private and company data. The video will explain why cybersecurity is important on an individual and personal level, how cyber attacks have been evolving and what vulnerabilities...
Author
Language
English
Description
Celebrating our national parks
• Denali National Park celebrates its centennial anniversary in 2017
• The park attracts more than 400,000 visitors annually
• More than 60 historic photographs throughout
Historic Denali National Park is a vibrant narrative that covers different parts of the park's history, from the Native Americans and the early explorers to park visitors today. Celebrate the 100th anniversary of Denali National Park and...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request