Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330325712 ISBN 13: 9783330325715
Da: Revaluation Books, Exeter, Regno Unito
EUR 100,71
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 92 pages. 8.66x5.91x0.21 inches. In Stock.
Lingua: Inglese
Editore: LAP Lambert Academic Publishing Jun 2017, 2017
ISBN 10: 3330325712 ISBN 13: 9783330325715
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 49,90
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -There is a need to investigate new technologic approaches where economic and social aspects become mutually supportive to enhance their impact on the communities¿ development. However, the protection of information infrastructure implies that no access, modification, deletion or otherwise denial of access to data or network resources or services is performed by unauthorized persons or entities. In this context, this book intends to be a thorough reflection on the awareness of potential threats and vulnerabilities, as well as a preoccupation towards cooperation in countering them with well-established rules and mechanisms created at a national and organizational level. This book is also relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies.Books on Demand GmbH, Überseering 33, 22297 Hamburg 92 pp. Englisch.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330325712 ISBN 13: 9783330325715
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 158,30
Quantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Lingua: Inglese
Editore: LAP Lambert Academic Publishing Jun 2017, 2017
ISBN 10: 3330325712 ISBN 13: 9783330325715
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 49,90
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -There is a need to investigate new technologic approaches where economic and social aspects become mutually supportive to enhance their impact on the communities' development. However, the protection of information infrastructure implies that no access, modification, deletion or otherwise denial of access to data or network resources or services is performed by unauthorized persons or entities. In this context, this book intends to be a thorough reflection on the awareness of potential threats and vulnerabilities, as well as a preoccupation towards cooperation in countering them with well-established rules and mechanisms created at a national and organizational level. This book is also relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies. 92 pp. Englisch.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330325712 ISBN 13: 9783330325715
Da: moluna, Greven, Germania
EUR 41,71
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Petrescu Anca GabrielaAnca Gabriela Petrescu holds a Ph.D. in management and her research interests include risk management and organisational management. Owning more than 7 years of experience in this area and having published many.
Lingua: Inglese
Editore: LAP Lambert Academic Publishing, 2017
ISBN 10: 3330325712 ISBN 13: 9783330325715
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 49,90
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - There is a need to investigate new technologic approaches where economic and social aspects become mutually supportive to enhance their impact on the communities' development. However, the protection of information infrastructure implies that no access, modification, deletion or otherwise denial of access to data or network resources or services is performed by unauthorized persons or entities. In this context, this book intends to be a thorough reflection on the awareness of potential threats and vulnerabilities, as well as a preoccupation towards cooperation in countering them with well-established rules and mechanisms created at a national and organizational level. This book is also relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies.