Skip to main content

Content tagged "Cybersecurity Canon"

Site Reliability Engineering: How Google Runs Production Systems
Book written by Betsey Beyer Book review by Rick Howard Executive Summary Site...
Women In cybersecurity
Book written by Jane LeClair and Denise Phelis Book review by Rinki Sethi...
The Seventh Sense: Power, Fortune, and Survival in the Age of Networks
Book written by Joshua Cooper Ramo Book review by Dr. Mansur Hasib Executive...
Information Disposition: A Practical Guide to the Secure, Compliant Disposal of Records, Media and IT Assets
Book written by Robert J. Johnson Book review by Ben Rothke Executive Summary...
Cybersecurity: Geopolitics, Law, and Policy
Book written by Amos N. Guiora Book review by William Yurek Executive Summary...
How to Measure Anything: Finding the Value of ‘Intangibles’ in Business
Book written by Douglas W. Hubbard Book review by Rick Howard Executive Summary...
The Cybersecurity Dilemma
Book written by Ben Buchanan Book review by John Davis Executive Summary The...
Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age
Book written by Steven Levy Book review by Jon Oltsik Executive Summary The...
CRACK99: The Takedown of a $100 Million Chinese Software Pirate
Book written by David Locke Hall Book review by Steve Winterfeld Executive...
Design for How People Think
Book written by John Whalen Book review by William Yurek Bottom Line: I don't...