Please use the links above to find what you were looking for.
You may not have been able to visit your page because of:
1. An out-of-date bookmark/favourite
2. A search engine that has an out-of-date listing
3. A mistyped address
4. You have no access to this page
5. The requested resource was not found.
6. An error has occurred while processing your request.
21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations. It draws from a combination of business, cultural, historical, and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organizations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.
Those that will benefit from the book include: law enforcement agencies, international information security professionals, IT professionals, military professionals, government policy makers and corporate managers. In particular, the book discusses:
1. The Chinese Cyberthreat
2. Evolution of Chinese Cyberwarfare
3. Chinese Unrestricted Warfare
4. Principles of Warfare – West versus East
5. Nature of Information Warfare
6. Chinese Cyberwarfare Doctrines
7. China's SIGINT Capabilities
8. Chinese IW Capabilities
9. The Chinese IW Organizational Structure
10. Chinese Commercial Enterprises
11. Commercial Objectives of Chinese Cyberattacks
12. Chinese Civilian Hackers
13. The Chinese Cyberthreat: Conclusions
Appendix A: China & the Internet – A history
Appendix B: Chinese Cyberactivism in the Spotlight
Appendix C: China's Informization Campaign
Appendix D: General Wang Pufeng's Challenge of Information Warfare
Appendix E: Chinese Hacker Website Resources
Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System
Buy today, in any format. We’ll send you a download link right away or ship it today for swift delivery to your selected destination.
“It’s practical approach to various aspects of the GDPR will be of value to DP practitioners in organisations of all sizes”
Laura Linkomies
The Regulation, which came into force on 25 May 2018, applies to all data controllers and processors that handle EU residents’ personal information.
All organisations – wherever they are in the world – that process the personal data of EU residents must comply with the Regulation. Failure to do so could result in fines of up to €20 million or 4% of annual global turnover – whichever is greater.
This book provides a detailed commentary on the GDPR, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties.
Now in its second edition, EU GDPR – An Implementation and Compliance Guide is a clear and comprehensive guide to this new data protection law. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand.
Topics covered include:
New in the second edition are:
The GDPR will have a significant impact on organisations’ data protection regimes around the world. EU GDPR – An Implementation and Compliance Guide shows you what you need to do to comply with the new law.
IT Governance is a leading global provider of IT governance, risk management and compliance expertise. We pride ourselves on delivering a broad range of integrated, high-quality solutions that meet the real-world needs of our international client base.
Our privacy team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, our understanding of the background and drivers for the GDPR, and the input of our fast-growing team of consultants and trainers are combined in this manual to provide the world’s first guide to implementing the new data protection regulation.
Discussions on project management forums highlight many of the challenges facing a project manager during the course of a project. Unclear requirements, scope creep, and undefined roles are well-trodden issues that can derail a project. Other challenges are less obvious, often more subtle, but equally destructive.
This book offers a focused and concise summary of 50 challenges facing today’s IT project manager. The authors draw on years of practical experience (rather than classroom theory) to outline these challenges and offer useful tips and advice on how to deal with them.
Readers of this book will be better equipped to respond to key project management challenges, including
This book condenses into a handy summary much of the information and advice that can be found in project management-related books and discussion forums. It is an ideal reference for anyone involved in IT project management, from professional service organizations (PSO) and project management offices (PMO) through to active project managers and studying graduates.
Buy this book and deliver your next project on time, on budget, and to specification
To hear about new books and exclusive offers from IT Governance Publishing, sign up and select "Books" from the New Products options.
Browse IT Service Management Books in the leading UK and international IT service management bookshop
BCM involves managing risks to ensure that mission-critical functions continue to provide an acceptable level of service, even in the event of a major disaster.
Implementing a BCMS that complies with the international standard ISO 22301 ensures your organisation can provide a minimum acceptable service despite a disruption, and helps preserve corporate reputation and revenue.
A Manager’s Guide to ISO22301 provides essential guidance to help successfully develop and implement an ISO 22301-compliant BCMS.
This book is the essential companion guide for those working in business continuity who are looking to introduce or optimise a BCMS aligned with ISO 22301, the only credible framework for effective BCM in the world.
It provides a comprehensive introduction to business continuity, including: