Please use the links above to find what you were looking for.
You may not have been able to visit your page because of:
1. An out-of-date bookmark/favourite
2. A search engine that has an out-of-date listing
3. A mistyped address
4. You have no access to this page
5. The requested resource was not found.
6. An error has occurred while processing your request.
21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations. It draws from a combination of business, cultural, historical, and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organizations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.
Those that will benefit from the book include: law enforcement agencies, international information security professionals, IT professionals, military professionals, government policy makers and corporate managers. In particular, the book discusses:
1. The Chinese Cyberthreat
2. Evolution of Chinese Cyberwarfare
3. Chinese Unrestricted Warfare
4. Principles of Warfare – West versus East
5. Nature of Information Warfare
6. Chinese Cyberwarfare Doctrines
7. China's SIGINT Capabilities
8. Chinese IW Capabilities
9. The Chinese IW Organizational Structure
10. Chinese Commercial Enterprises
11. Commercial Objectives of Chinese Cyberattacks
12. Chinese Civilian Hackers
13. The Chinese Cyberthreat: Conclusions
Appendix A: China & the Internet – A history
Appendix B: Chinese Cyberactivism in the Spotlight
Appendix C: China's Informization Campaign
Appendix D: General Wang Pufeng's Challenge of Information Warfare
Appendix E: Chinese Hacker Website Resources
Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System
Buy today, in any format. We’ll send you a download link right away or ship it today for swift delivery to your selected destination.
“It’s practical approach to various aspects of the GDPR will be of value to DP practitioners in organisations of all sizes”
Laura Linkomies
The Regulation, which came into force on 25 May 2018, applies to all data controllers and processors that handle EU residents’ personal information.
All organisations – wherever they are in the world – that process the personal data of EU residents must comply with the Regulation. Failure to do so could result in fines of up to €20 million or 4% of annual global turnover – whichever is greater.
This book provides a detailed commentary on the GDPR, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties.
Now in its second edition, EU GDPR – An Implementation and Compliance Guide is a clear and comprehensive guide to this new data protection law. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand.
Topics covered include:
New in the second edition are:
The GDPR will have a significant impact on organisations’ data protection regimes around the world. EU GDPR – An Implementation and Compliance Guide shows you what you need to do to comply with the new law.
IT Governance is a leading global provider of IT governance, risk management and compliance expertise. We pride ourselves on delivering a broad range of integrated, high-quality solutions that meet the real-world needs of our international client base.
Our privacy team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, our understanding of the background and drivers for the GDPR, and the input of our fast-growing team of consultants and trainers are combined in this manual to provide the world’s first guide to implementing the new data protection regulation.
With the Data Flow Mapping Tool, mapping your data flows has never been easier. Create data flow maps – a vital component for GDPR compliance - that can be reviewed, revised and updated when needed, as well as identify weaknesses within your processes.
The licence includes:
The Data Flow Mapping Tool is offered as an annual renewable licence for one user. An invoice will be raised every year so that you can continue to benefit from updates and unlimited technical support.
After you have completed your order, you will receive a sales receipt and an invite email from the CyberComply platform (if you don’t receive these emails, please check your junk folder).
The invite will be sent via noreply@cybercomply.co.uk and it will include a link to access the platform.
Once you have clicked the link, you will be directed to www.cybercomply.co.uk where you will be asked to enter your email and password (a temporary password will be included in the invite email).
You will then have full access to your account.
Once you have accessed your account, you can access our user guides directly from the home screen/dashboard. Alternatively, you can contact support using the icon at the top right of the home screen.
Please note: The invite is valid for 24 hours. Please email support@vigilantsoftware.co.uk should you require a new invite.
Discussions on project management forums highlight many of the challenges facing a project manager during the course of a project. Unclear requirements, scope creep, and undefined roles are well-trodden issues that can derail a project. Other challenges are less obvious, often more subtle, but equally destructive.
This book offers a focused and concise summary of 50 challenges facing today’s IT project manager. The authors draw on years of practical experience (rather than classroom theory) to outline these challenges and offer useful tips and advice on how to deal with them.
Readers of this book will be better equipped to respond to key project management challenges, including
This book condenses into a handy summary much of the information and advice that can be found in project management-related books and discussion forums. It is an ideal reference for anyone involved in IT project management, from professional service organizations (PSO) and project management offices (PMO) through to active project managers and studying graduates.
Buy this book and deliver your next project on time, on budget, and to specification
To hear about new books and exclusive offers from IT Governance Publishing, sign up and select "Books" from the New Products options.