Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization ca...Savoir plus
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud t...Savoir plus
This book is about the primary symptoms present in a dysfunctional culture that could have devastating outcomes for any organization. The book outline...Savoir plus
This book explores how digital transformation is reshaping the manner in which higher education sectors emerge, work, and evolve and how auditors shou...Savoir plus
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management,...Savoir plus
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of t...Savoir plus
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scal...Savoir plus
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Savoir plus
Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new techn...Savoir plus
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...Savoir plus
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various ty...Savoir plus
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among o...Savoir plus
This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It pr...Savoir plus
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scal...Savoir plus
IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this boo...Savoir plus
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business...Savoir plus
This book provides practitioners with strategies and tools for establishing and maintaining a successful, value-centric internal audit organization.Savoir plus
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform ...Savoir plus
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with th...Savoir plus
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud t...Savoir plus
In "Finding your Granite", Executive Leadership Coach and Mentor Douglas Pflug walks you through some of the life experiences, lessons and key take-wa...Savoir plus
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an ...Savoir plus
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance ...Savoir plus
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint coveri...Savoir plus