{"title":"Technology \u0026 Computing","description":"","products":[{"product_id":"thermal-design-of-shell-and-tube-heat-exchangers","title":"Thermal Design of Shell and Tube Heat Exchangers","description":"","brand":"FastPrint","offers":[{"title":"Paperback","offer_id":35041489813549,"sku":"9781844268443","price":24.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781844268443.jpg?v=1728552511"},{"product_id":"iso-iec-38500-the-it-governance-standard","title":"ISO\/IEC 38500: The IT Governance Standard","description":"\u003cp\u003eThis useful pocket guide provides an account of the scope and objectives of the standard. It outlines the standard's six core principles, sets out the three major tasks that the standard assigns to directors regarding IT, and explains the interrelationship between the two. The guide also offers advice on how to set up and implement the IT governance framework.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041489879085,"sku":"9781905356577","price":9.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781905356577.jpg?v=1728552512"},{"product_id":"iso27001-iso27002-a-pocket-guide","title":"ISO27001 \/ ISO27002: A Pocket Guide","description":"\u003cp\u003eInformation is one of your organisation's most important resources and keeping that information secure is vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it.  An ISMS based on ISO27001\/ISO27002 offers a host of benefits: Improved efficiency by having information security systems and procedures in place, enabling you to focus more on your core business. Protects your information assets from a wide range of cyber threats, criminal activity, insider compromise and system failure. Manage your risks systematically and establish plans to eliminate or reduce cyber threats. Enables earlier detection of threats or processing errors, and faster resolution.  Next step to certification?  You can arrange for an independent audit of your ISMS against the specifications of ISO27001 and, if your ISMS conforms, eventually achieve accredited certification. We publish a range of ISMS documentation toolkits and books (such as Nine Steps to Success), to help you achieve this.  Contents  1. The ISO\/IEC 27000 Family of Information Security Standards; 2. Background to the Standards; 3. Specification vs Code of Practice; 4. Certification Process; 5. The ISMS and ISO27001; 6. Overview of ISO\/IEC 27001:2013; 7. Overview of ISO\/IEC 27002:2013; 8. Documentation and Records; 9. Management Responsibility; 10. Process Approach and the PDCA Cycle; 11. Context, Policy and Scope; 12. Risk Assessment; 13. The Statement of Applicability; 14. Implementation; 15. Check and Act; 16. Management Review; 17. ISO27001 Annex A\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041491943469,"sku":"9781905356706","price":19.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781905356706.jpg?v=1728552543"},{"product_id":"iso14001-step-by-step-a-practical-guide","title":"ISO14001 Step by Step: A Practical Guide","description":"\u003cp\u003eIn the 21st century, business has to take sustainability seriously. As public opinion becomes increasingly concerned about climate change, governments are imposing ever tighter environmental regulations on both industry and the retail sector. By putting in place an environmental management system (EMS), you can ensure you are disposing of your waste in a responsible manner and making the most efficient use of raw materials. This will help you to lower carbon emissions and keep the negative impact of your business on the environment to a minimum.  ISO14001 The International Standard  The international standard for an EMS is ISO14001. With an EMS certified to ISO14001, you can improve the safety and efficiency of your business operations, and, at the same time, boost customer confidence and reassure your stakeholders.  An invaluable step-by-step guide  This pocket guide, intended to help you put in place an EMS, is specifically focused on ISO14001. It is designed to enable industry managers, who may be lacking in specialist knowledge, to achieve compliance with the Standard. A step-by-step approach makes the guide easy to follow. The authors, two experienced auditors, are acknowledged experts on environmental management systems, and they have drawn on material from the UK's Environment Agency. The pocket guide will prove invaluable, not only for auditors and trainers, but also for managers across many sectors of industry.  Read this guide and learn how to … Achieve compliance with ISO14001  Instead of just telling you, in bureaucratic fashion, what is specified under ISO14001, this user-friendly guide looks at the active steps you can take in order to ensure compliance with the Standard. It discusses the factors you need to consider when defining the objectives of the EMS, such as financial viability and available technology, and offers suggestions for measuring and monitoring the effectiveness of your environmental policy.  Manage environmental risks The Deepwater Horizon oil spill is an example of the financial and reputational risks associated with environmental pollution. This pocket guide contains sound advice on the types of operational controls you need to put in place to manage environmental risks and help avoid incidents.  Prepare to deal with an emergency  The pocket guide offers suggestions on how to plan for an emergency, such as a spillage or a gas leak, ensuring you have procedures in place to minimise the environmental impact.  Improve the image of your brand Ultimately, organisations aim to operate in a way that shows respect for the environment. Certification to ISO14001 is a recognised measure of that commitment. It is in the interests of your business to be well regarded by the public and, if you use this guide to help secure compliance with ISO14001, you can improve public perception of your organisation. Investing in ISO14001 certification can contribute to enhanced brand equity.   Take your organisation step by step towards successful ISO14001 certification! Order this pocket guide today!     Naeem Sadiq is a certified lead auditor and lead trainer for the ISO14001 standard. His work experience in engineering and management includes working as an independent consultant, auditor, and trainer for ISO14001 and ISO9001, as well as for the occupational health and safety standard OHSAS18001. Mr Sadiq has attended various conferences to give papers on standards for management systems, besides providing over 100 organisations with consultancy, training and auditing support. He holds a Masters degree in Manufacturing Engineering and writes regularly for the newspapers on environmental and social issues.  Asif Hayat Khan is a trained lead auditor and a trainer for ISO9001, ISO14001 and OHSAS18001. In addition, he is a hazard analysis critical control point (HACCP) auditor and has DuPont certification as a trainer in behavioural safety. In his various roles as consultant, auditor, trainer and manager, he has long experience of establishing and implementing the ISO9001 and ISO14001 standards across various sectors of industry. Mr Khan holds a Bachelor of Science degree in Industrial Engineering.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041492238381,"sku":"9781849281027","price":19.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849281027.jpg?v=1728552603"},{"product_id":"digital-evolution-of-broadcast-technology","title":"Digital Evolution of Broadcast Technology","description":"","brand":"FastPrint","offers":[{"title":"Paperback","offer_id":35041506623533,"sku":"9781844267538","price":25.0,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781844267538.jpg?v=1728552856"},{"product_id":"applied-animal-feed-science-and-technology","title":"Applied Animal Feed Science and Technology","description":"","brand":"Upfront Publishing","offers":[{"title":"Paperback","offer_id":35041543225389,"sku":"9781844262717","price":8.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781844262717.jpg?v=1728552974"},{"product_id":"pig-production-science-and-technology","title":"Pig Production: Science and Technology","description":"","brand":"Upfront Publishing","offers":[{"title":"Paperback","offer_id":35041543258157,"sku":"9781844261826","price":7.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781844261826.jpg?v=1728552975"},{"product_id":"ss182-instructions-on-bombing-pts-i-and-ii","title":"ss182 - Instructions on Bombing Pts I and II","description":"\u003cp\u003eThis manual clearly describes the selection, training and employment of bombers and how the grenade as a weapon takes careful and special training to use. It provides a fascinating insight and dispels the myth that contrary to popular belief, a grenade is not just a something that you “pull the pin out and throw it”.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041548206125,"sku":"9781908487070","price":13.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487070.jpg?v=1728553094"},{"product_id":"death-of-a-light-bulb","title":"Death of a Light Bulb","description":"","brand":"Blue Ocean Publishing","offers":[{"title":"Paperback","offer_id":35041564524589,"sku":"9781907527081","price":9.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781907527081.jpg?v=1728553476"},{"product_id":"historic-cheeses-leicestershire-stilton-stichelton","title":"Historic Cheeses : Leicestershire, Stilton, Stichelton","description":"","brand":"DB Publishing","offers":[{"title":"Paperback","offer_id":35041693761581,"sku":"9781780911113","price":12.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781780911113.jpg?v=1728554318"},{"product_id":"theres-a-calf-in-the-sitting-room","title":"There's a Calf in the Sitting Room","description":"","brand":"DB Publishing","offers":[{"title":"Paperback","offer_id":35041694580781,"sku":"9781780911212","price":12.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781780911212.jpg?v=1728554351"},{"product_id":"television-timeline","title":"Television Timeline","description":"","brand":"Blue Ocean Publishing","offers":[{"title":"Paperback","offer_id":35041702641709,"sku":"9781907527159","price":20.0,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781907527159.jpg?v=1728554705"},{"product_id":"paths-are-made-by-walking","title":"Paths are Made by Walking","description":"\u003cp\u003eIn 1985 Jennifer and Ian Hartley left their home, bought a caravan and moved to Cambridgeshire to witness against the sighting of Cruise missiles at RAF Molesworth. This memoir recounts their day to day life living in this unusual place and the dialogue they had with MPs, the military, police, peace campaigners, the local community and the church.\u003c\/p\u003e","brand":"FastPrint Publishing","offers":[{"title":"Paperback","offer_id":35041703034925,"sku":"9781780355528","price":8.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781780355528.jpg?v=1728554717"},{"product_id":"the-lineages-and-composition-of-gurkha-regiments-in-british-service","title":"The Lineages and Composition of Gurkha Regiments in British Service","description":"","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041705328685,"sku":"9781908487414","price":21.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487414.jpg?v=1728554805"},{"product_id":"ss186_handbook-of-ammunition","title":"SS186_Handbook of Ammunition","description":"","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041712439341,"sku":"9781908487599","price":12.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487599.jpg?v=1728690331"},{"product_id":"horse-mobilization","title":"Horse Mobilization","description":"","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041712472109,"sku":"9781908487605","price":7.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487605.jpg?v=1728690331"},{"product_id":"ss192_the-employment-of-machine-guns-part-1-tactical","title":"SS192_The Employment of Machine Guns Part 1 - Tactical","description":"","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041712603181,"sku":"9781908487629","price":11.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487629.jpg?v=1728690331"},{"product_id":"ss192_the-employment-of-machine-guns-part-2-organization-direction-of-fire","title":"SS192_The Employment of Machine Guns Part 2 - Organization \u0026 Direction of Fire","description":"\u003cp\u003eAt the time of the Great War - after artillery - machine guns were seen as the most effective weapon employed in modern war. Due to the technicalities involved, it was paramount that detailed instructions were given. This book gives intricate direction to machine gunners including information regarding the mathematics, direction of fire, trajectories and elevations required in the usage of a weapon that was still in its relative infancy.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041712635949,"sku":"9781908487636","price":13.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487636.jpg?v=1728690342"},{"product_id":"ss640_salvage","title":"SS640_Salvage","description":"\u003cp\u003eThe longer a war is fought the more important the issue of salvage becomes. The economy in material is only second to the economy in manpower. During the Great War, as it became apparent that the fight was going to be a long one, the abundance of materials became less. This booklet gives information to those officers responsible for salvage in regards to their duties, as well as the different types of salvage they would come across, giving an important insight to a side of war that is sometimes overlooked.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041712701485,"sku":"9781908487650","price":8.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487650.jpg?v=1728690342"},{"product_id":"ss728_guidance-of-officers-of-the-labour-corps-in-france","title":"SS728_Guidance of Officers of the Labour Corps in France","description":"\u003cp\u003eThis booklet, whilst relating specifically to the Labour Corps in France, provides not only a fascinating insight into Labour Corps itself but also an overview of how a British Army Unit was organized. Covering all aspects of unit organization pertaining to the Labour Corps, it details the type of units that made up the Labour Corps and helps understand more about an organization that rarely features as a subject widely studied, but played a vital role in France on the Western Front.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041715585069,"sku":"9781908487674","price":10.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487674.jpg?v=1728690473"},{"product_id":"40wo2233_veterinary-manual-war-1915","title":"40WO2233_Veterinary Manual (War), 1915","description":"\u003cp\u003eAt a time when horses were a key part to the war effort, the Veterinary Service of an Army was just as important to ensure that there was a constant mobilization of healthy, fit animals. This document details how the Veterinary Service is organized and explains the roles of the staff and officers involved in this service.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041715748909,"sku":"9781908487681","price":8.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487681.jpg?v=1728690482"},{"product_id":"details-of-the-sets-of-harness-required-for-the-various-natures-of-service-pattern-vehicles","title":"Details of the Sets of Harness Required for the Various Natures of Service Pattern Vehicles","description":"\u003cp\u003eUsing detailed tables, this book gives information on the types of harness required for vehicles such as General Service Wagons and Gun Carriages.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041716928557,"sku":"9781908487728","price":7.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487728.jpg?v=1728690534"},{"product_id":"remount_regulations1913","title":"Remount_Regulations(1913)","description":"\u003cp\u003eThe Remount Service Department of the British Army was responsible for the purchase, maintenance and mobilization of horses at both peace time and in preparation for war. This interesting booklet details the regulations followed by the department in all its remount duties including branding and casting to impressment and delivery.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041718304813,"sku":"9781908487766","price":10.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487766.jpg?v=1728690586"},{"product_id":"40wo7055_notes_on_horse_management_in_the_field1919","title":"40WO7055_Notes_on_Horse_Management_in_the_Field(1919)","description":"\u003cp\u003eIt was important, during a time of national emergency, that the horses mobilized for military purposes were kept as fit and useful as possible - keeping accidents and illness to a minimum.This pocket-guide is a useful reference source for all staff working with horses, giving information on feeding and grooming, to detecting skin diseases and inspecting shoes.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041718796333,"sku":"9781908487773","price":8.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487773.jpg?v=1728690605"},{"product_id":"ss550_notes_and_illustrations_on_the_interpretation_of_aeroplane_photographs_pb","title":"SS550_Notes_and_Illustrations_on_the_Interpretation_of_Aeroplane_Photographs_PB","description":"\u003cp\u003eHaving the intelligence to identify and locate important military features of the enemy is something that plays a key role in all types of warfare. This detailed manual is a compendium of photographs that represent the different natures of ground on the whole front between the sea and the Oise, giving the British Army vital intelligence in regards to such things as the German Army's trenches, machine gun emplacement, buried cables, tank traps, railways and trench tramways.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041719713837,"sku":"9781908487858","price":25.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487858.jpg?v=1728690663"},{"product_id":"ss162_notes_on_identification_of_aeroplanes","title":"SS162_Notes_on_Identification_of_Aeroplanes","description":"\u003cp\u003eDuring a time of war, having the knowledge and skill to identify not only enemy aircraft but also those of yours and your Allies is of utmost importance in both attack and defence. Cases of 'friendly fire' do happen but by equipping military personnel with the right knowledge helps keep these to a minimum. In this manual, descriptions and illustrations of British, French and German aeroplanes used during the Great War help observers distinguish the characteristics of individual aircraft.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041720401965,"sku":"9781908487865","price":12.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487865.jpg?v=1728690682"},{"product_id":"cds74_the_training_and_employment_of_grenadiers","title":"CDS74_The_Training_and_Employment_of_Grenadiers","description":"\u003cp\u003eThe way in which the Great War evolved meant that the employment of hand grenades both in attack and defence became one of the principal weapons in trench warfare. This informative manual gives the grenadier detailed training instructions on the correct methods of grenade throwing, a lowdown on the equipment required, as well as instructions on employment of grenadiers both in attack and defence.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041720991789,"sku":"9781908487889","price":13.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487889.jpg?v=1728690714"},{"product_id":"by-design","title":"By Design","description":"\u003cp\u003e\"Both engineering and human living take place in a messy world, one chock full of unknowns and contingencies. \"Design reasoning\" is the way engineers cope with real-world contingency. Because of the messiness, books about engineering design cannot have \"ideal solutions\" printed in the back in the same way that mathematics textbooks can. Design reasoning does not produce a single, ideally correct answer to a given problem but rather generates a wide variety of rival solutions that vie against each other for their relative level of \"satisfactoriness.\" A reasoning process analogous to design is needed in ethics. Since the realm of interpersonal relations is itself a fluid and highly contingent real-world affair, design reasoning offers the promise of a useful paradigm for ethical reasoning. This volume undertakes two tasks. First, it employs design reasoning to illustrate how technological artifacts can be assessed for their inherent moral properties. Second, it uses the design paradigm as a means for bringing engineering ethics into conversation with Christian theology in order to show how each can be for the other a catalyst for the revolutionary task of living by design.\"\u003c\/p\u003e","brand":"James Clarke \u0026 Co","offers":[{"title":"Paperback","offer_id":35041729577005,"sku":"9780227174173","price":25.75,"currency_code":"GBP","in_stock":true}]},{"product_id":"ss757_results-of-preliminary-reconnaissance-and-comparison-with-air-photographs-pf-the-ground-re-occupied-in-the-forward-areas-of-the-lys-salient","title":"SS757_Results of Preliminary Reconnaissance and Comparison with Air Photographs pf the Ground Re-Occupied in the Forward Areas of the Lys Salient","description":"","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041736753197,"sku":"9781908487896","price":9.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487896.jpg?v=1728691470"},{"product_id":"ss345_memorandum-treatment-of-injuries-in-war","title":"SS345_Memorandum-Treatment of Injuries in War","description":"\u003cp\u003eA compact guide summarizing the experience gained in the Military Hospitals in France between October 1914 and July 1915. Published in order to attain a uniformed approach in treatment methods based upon definite observation, it details dressing gunshot injuries and methods of amputation through to spinal injuries and penetrating wounds of the chest and lungs. Includes photographic plates of splints and frames used.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041736785965,"sku":"9781908487919","price":12.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487919.jpg?v=1728691474"},{"product_id":"ss306_notes-on-german-fuzes-and-typical-french-and-belgian-fuzes","title":"SS306_Notes on German Fuzes and Typical French and Belgian Fuzes","description":"\u003cp\u003eWith more than 856 million shells fired during the Great War, the fuze was a vital device in the munitions industry for all sides involved. When the French first encountered the German artillery it became apparent that they had a much larger and more varied range of guns and Howitzers. It therefore became necessary for the Allies to gain intelligence on what the enemy had and how they could better it. This manual contains illustrations and detailed descriptions of German, French and Belgian fuzes and breaks the German fuzes into categories such as percussion, time and percussion fuzes, obsolete fuzes, naval fuzes and 'minenwerfer' fuzes.\u003c\/p\u003e","brand":"FireStep Press","offers":[{"title":"Paperback","offer_id":35041736917037,"sku":"9781908487926","price":14.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908487926.jpg?v=1728691483"},{"product_id":"we-kept-em-flying-the-support-personnel-of-the-wartime-raf","title":"We Kept 'Em Flying - The Support Personnel of the Wartime RAF","description":"\u003cp\u003eAs the narratives in this book show, although the aircrew faced opposition each time they flew, it was far from common for supporting personnel too to find themselves enduring direct enemy fire. The narratives also reflect the diversity of roles undertaken by ground personnel, not only in the beleaguered United Kingdom and later in wartorn Europe, but also in the desert and jungle campaigns of the Middle- and Far-Eastern theatres. There are glimpses too of the world outside the Service, with a schoolgirl recalling the warmth between her family and the exiled foreign flier billeted upon them; and another woman visiting operational stations as a civilian aircraft-repair worker. What all the narratives show is that it is the ground personnel who underpin RAF formations. This book then, is a tribute to the supporting and non-operational personnel of the World War Two RAF.\u003c\/p\u003e","brand":"DB Publishing","offers":[{"title":"Paperback","offer_id":35041740750893,"sku":"9781780913759","price":14.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781780913759.jpg?v=1728691696"},{"product_id":"through-enemy-skies-with-wartime-bomber-command-aircrews","title":"Through Enemy Skies - with Wartime Bomber Command Aircrews","description":"\u003cp\u003eStarting with the disastrous misemployment of the force in the opening weeks of the conflict, they progress from bombing raids with each aircraft acting independently, to hundreds of heavy bombers being channelled over the release point. The accounts open with the poignant letters written by an eighteen-year-old killed on his first operation three weeks into the war. Other crew members detail their experiences as the force gained expertise. Tours are recalled too when the focus of operations had changed to tactical support of the Allied land forces. What is invariably reflected is the bewilderment felt at the post-war opprobrium visited upon Bomber Command; more especially as Churchill declared in 1940 that, without it, â€˜I do not see a way throughâ€™.\u003c\/p\u003e","brand":"DB Publishing","offers":[{"title":"Paperback","offer_id":35041740980269,"sku":"9781780914121","price":14.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781780914121.jpg?v=1728691713"},{"product_id":"the-war-diary-of-an-english-soldier","title":"THE WAR DIARY OF AN ENGLISH SOLDIER","description":"\u003cp\u003eHe was only one of more than 90,000 casualties by the end of 1914, this is his story told direct from Flanders as it was happening.\u003c\/p\u003e","brand":"Reveille Press","offers":[{"title":"Paperback","offer_id":35041744715821,"sku":"9781908336996","price":8.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908336996.jpg?v=1728691912"},{"product_id":"the-story-of-army-radar","title":"THE STORY OF ARMY RADAR","description":"\u003cp\u003eThe first book to be published since 1950 to tell the story of the early development and employment of anti-aircraft and coast artillery radars during the Second World War.  The principle of radar was first demonstrated by Sir Robert Watson-Watt at Orfordness in 1935 leading to the development of the Chain Home air defense system which was in service by 1939. The development of radar to support anti-aircraft fire control and coast defence was initiated by the Army cell at Bawdsey Research Station on the Suffolk coast in 1936. When war was declared, this moved to the Air Defence Research and Development Establishment at Christchurch from which emerged the first metric wavelength sets for gun laying, searchlight control and coast artillery.   Amongst the detailed topics covered, this book examines the arrival of the magnetron valve in 1940 and the subsequent development of microwave radars and in parallel the development of Identification, Friend or Foe, the radar proximity fuze, and comparable US and German radar. It also looks at the conduct of AA and Coast operations; the part played by service and civilian support organisations. Technical appendices explain how early radars functioned.\u003c\/p\u003e","brand":"Menin House","offers":[{"title":"Paperback","offer_id":35041744781357,"sku":"9781908336842","price":15.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781908336842.jpg?v=1728691918"},{"product_id":"all-at-sea","title":"All At Sea","description":"\u003cp\u003eThis is the life story of a young man born in the 1920s. It covers his early youth in Shropshire until, following in his Royal Marine father's footsteps, he joined the Royal Navy. It follows his experiences during the war years. The remainder of the story deals with life in the Mediterranean, Far East and West Africa where his family joined him when possible.\u003c\/p\u003e","brand":"YouCaxton Publications","offers":[{"title":"Paperback","offer_id":35041751662637,"sku":"9781909644267","price":9.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781909644267.jpg?v=1728692196"},{"product_id":"the-epic-struggle-for-the-internet-of-things","title":"The Epic Struggle for the Internet of Things","description":"\u003cp\u003eIf the hype is to be believed then the next big thing is the Internet of Things. But is it what you think it is? In this piercing and provocative essay, Bruce Sterling tells the story of an idea that just won't go away because there's too much money to be made and a whole world to control.\u003c\/p\u003e","brand":"Strelka Press","offers":[{"title":"Paperback","offer_id":35041865957421,"sku":"9785906264305","price":5.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9785906264305.jpg?v=1728692672"},{"product_id":"architecting-systems-concepts-principles-and-practice","title":"Architecting Systems. Concepts, Principles and Practice","description":"\u003cp\u003eWhat do the Wall Street “Flash Crash”, the 2003 invasion of Iraq, and the community on the remote Scottish island of St Kilda, have in common? They're all complex systems that failed in unexpected ways because critical interdependencies weren't understood properly.  Why do so many big projects overspend and over-run? They're managed as if they were merely complicated when in fact they are complex. They're planned as if everything was known at the start when in fact they involve high levels of uncertainty and risk.  In a rapidly changing world, how do you plan for success and create adaptable, resilient, sustainable systems that will achieve their purpose without adverse unintended consequences?  Based on the author's extensive experience as a practical engineer and thought-leader in the systems business, this book provides a highly readable synthesis of the foundations for architecting systems. Starting from a clear set of systems principles and insights into the nature of complexity, the “six step architecting process” will help you to unravel complexity and to architect systems of any type, scale and socio-technical mix. It's illustrated with numerous examples ranging from familiar domestic situations through software-dependent products and services to ultra-large-scale sociotechnical networks spanning the planet.  This book is required reading for engineers, managers, clients and leaders of change faced with the challenges of developing systems for the 21st Century. It gives architecting teams and their stakeholders a common understanding of the why, the what, and the how of architecting systems fit for the future.\u003c\/p\u003e","brand":"College Publications","offers":[{"title":"Paperback","offer_id":35041884962861,"sku":"9781848901544","price":20.0,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781848901544.jpg?v=1728710553"},{"product_id":"data-protection-and-the-cloud-are-the-risks-too-great","title":"Data Protection and the Cloud: Are the risks too great?","description":"\u003cp\u003eThe UK's Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA's eight principles could lead to claims for compensation from affected individuals and financial penalties of up to £500,000 from the Information Commissioner's Office, not to mention negative publicity and reputational damage.  An expert introduction  More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services.  Data Protection and the Cloud highlights the risks an organisation's use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.  Topics covered include: Protecting the confidentiality, integrity and accessibility of personal data  Data protection responsibilities  The data controller\/data processor relationship  How to choose Cloud providers  Cloud security - including two-factor authentication, data classification and segmentation  The increased vulnerability of data in transit  The problem of BYOD (bring your own device)  Data transfer abroad, US Safe Harbor and EU legislation  Relevant legislation, frameworks and guidance, including: the EU General Data Protection Regulation  Cloud computing standards  the international information security standard, ISO 27001  the UK Government's Cyber Essentials scheme and security framework  CESG's Cloud security management principles  guidance from the Information Commissioner's Office and the Open Web Application Security Project (OWASP)    Mitigate the security risks  Mitigating security risks requires a range of combined measures to be used to provide end-to-end security. Moving to the Cloud does not solve security problems, it just adds another element that must be addressed. Data Protection and the Cloud provides information on how to do so while meeting the DPA's eight principles.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041901051949,"sku":"9781849287128","price":9.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287128.jpg?v=1728711250"},{"product_id":"build-a-security-culture","title":"Build a Security Culture","description":"\u003cp\u003eIn this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour . He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Contents 1.What is security culture? 2.The Elements of security culture 3.How does security culture relate to security awareness? 4.Asking for help raises your chances of success 5.The psychology of groups and how to use it to your benefit 6.Measuring culture 7.Building security culture About the author Kai Roer is a management and security consultant and trainer with extensive international experience from more than 30 countries around the world. He is a guest lecturer at several universities, and the founder of The Roer Group, a European management consulting group focusing on security culture. Kai has authored a number of books on leadership and cyber security , has been published extensively in print and online, has appeared on radio and television, and has featured in printed media. He is a columnist at Help Net Security and has been the Cloud Security Alliance Norway chapter president since 2012. Kai is a passionate public speaker who engages his audience with his entertaining style and deep knowledge of human behaviours , psychology and cyber security . He is a Fellow of the National Cybersecurity Institute and runs a blog on information security and culture (roer.com). Kai is the host of Security Culture TV, a monthly video and podcast. Series information Build a Security Culture is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz. Build a security-minded culture within your organisation - buy this book today and get the help and guidance you need.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041902264365,"sku":"9781849287166","price":16.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287166.jpg?v=1728711316"},{"product_id":"reviewing-it-in-due-diligence","title":"Reviewing IT in Due Diligence","description":"\u003cp\u003eReviewing IT in Due Diligence provides an introduction to IRM in due diligence, and outlines some of the key IT issues to consider as part of the due diligence process. For those new to the process, it explains how to conduct an IT due diligence review, from scoping to reporting, and includes information on post-merger integration to realise business benefits from the deal.  For more experienced practitioners, Reviewing IT in Due Diligence provides fresh insight into the process, highlighting issues that need to be addressed, and provides a business case for IRM involvement in the due diligence process.  Topics covered include: Why IT is important to due diligence The importance of IT security System reviews and data reviews Reviewing projects and changes in progress IT service provision value for money IT due diligence reporting Post-merger integration  Comprehensive case studies are included throughout the book.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041902297133,"sku":"9781849287203","price":12.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287203.jpg?v=1728711323"},{"product_id":"an-introduction-to-anti-bribery-management-systems-bs-10500","title":"An Introduction to Anti-Bribery Management Systems (BS 10500)","description":"\u003cp\u003eThis book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation ; controls for contractors; facilitation payments; charitable and political donations; risk assessment in due diligence; whistle-blowing and bribery investigations; and internal auditing and corrective action.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041904885805,"sku":"9781849287241","price":9.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287241.jpg?v=1728711414"},{"product_id":"two-factor-authentication","title":"Two-Factor Authentication","description":"\u003cp\u003eAn introduction to the topic of two-factor authentication providing a comprehensive evaluation of popular secondary authentication methods. The book presents international examples of standards and regulations that make two-factor authentication a component of security guidance.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041906294829,"sku":"9781849287326","price":12.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287326.jpg?v=1728711478"},{"product_id":"the-tao-of-open-source-intelligence","title":"The Tao of Open Source Intelligence","description":"\u003cp\u003eThe Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms such as those associated with social media has confirmed its dominance as the main information exchange platform for the foreseeable future.  But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results.  Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation.  Product overview The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques, for the investigator:  It catalogues and explains the tools and investigative approaches that are required when conducting research within the surface, deep and dark webs.  It explains how to scrutinise criminal activity without compromising your anonymity - and your investigation. It examines the relevance of cyber geography and how to get around its limitations.  It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz and Carrot2) that collate search data from single-source intelligence platforms such as Google.  It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools and specialist search syntax (Google kung fu).  It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy.  OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.  The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.  About the author Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security , corporate investigations and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world's leading private-sector intelligence and security agencies.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041907802157,"sku":"9781849287289","price":29.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287289.jpg?v=1728711546"},{"product_id":"assessing-it-projects-to-ensure-successful-outcomes","title":"Assessing IT Projects to Ensure Successful Outcomes","description":"\u003cp\u003eCompanies invest billions in technology projects each year, yet their success rates remain surprisingly low. Industry benchmarks suggest that only 15-20% of projects are completed on time and on budget. Project failures can impair an organisation's capability as well as having significant commercial, compliance and security ramifications, which in turn could cause reputational damage and long-term financial losses. It is therefore critical that projects meet their objectives. One way of ensuring that they do is to conduct assessments or audits at key points during their lifecycle. Product overview Assessing IT Projects to Ensure Successful Outcomes is a comprehensive reference guide that focuses on the assessment of IT projects. Organised into five main sections (Approach, Plan, Collect Information, Assess and Recommend, Package and Present), interspersed with case studies based on the author's extensive experience delivering projects, the book provides exhaustive guidance on structuring and conducting an IT project assessment, from planning to presentation. Assessing IT Projects to Ensure Successful Outcomes includes guidance on: Types of assessments and project approaches, including the difference between a project and programme assessment. Determining a suitable assessment approach, developing a plan, preparing inventories and planning for logistics. Information collection and assessment, including identifying and addressing challenges and gaps. Project scoping, change management, schedule management and cost management. Key roles and focus areas, including team responsibilities and necessary documents, for each project stage. Communication strategies to ensure all stakeholders are kept appropriately informed of a project's progress. RAID (risks, actions, issues, decisions) management to address risks and issues that arise, actions that must be performed, and decisions that need to be made throughout the project's lifecycle. Compliance with standard frameworks. Intangibles, such as adapting to company cultures and reacting to cultural conflicts, resource and team dynamics, perception and reputations, and morale. How to package and present an assessment's findings and recommendations in a suitable manner. It also features a detailed summary section containing checklists for assessing all stages of projects - including typical roles on a project team, details of interview responsibilities by role, and a list of necessary project documents. This information can be used either reactively as an easy reference to assess projects, or proactively as a checklist of the considerations and activities required to plan and manage a project. Although principally aimed at professionals who are assessing projects - such as internal auditors, framework auditors, project assessors or external consultants - Assessing IT Projects to Ensure Successful Outcomes can also be used by project managers looking for a comprehensive view of approaches for managing projects, or as a means of preparing for an assessment of their project. About the author Kerry Wills is a consultant and a project manager who has worked on multi-million dollar technology projects for Fortune 500 companies since 1995, gaining essential experience as programme manager, project manager, architect, developer, business analyst and tester. This breadth of experience gives him a deep understanding of all facets of IT projects. He has planned and executed several large programmes , as well as assessed and remediated several troubled programmes . Kerry Wills is also the author of Essential Project Management Skills and Applying Guiding Principles of Effective Program Delivery.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041908949037,"sku":"9781849287364","price":49.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287364.jpg?v=1728711617"},{"product_id":"set-the-storyworld-to-random-how-to-connect-with-modern-transmedia-audiences","title":"Set the Storyworld to Random: How to Connect with Modern Transmedia Audiences","description":"\u003cp\u003eYou need to read this book if you have an interest in where new technology is taking storytelling. “Set the Storyworld to Random” is about storytelling, media and modern audiences.\u003c\/p\u003e","brand":"FastPrint","offers":[{"title":"Paperback","offer_id":35041921007661,"sku":"9781784562281","price":9.99,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781784562281.jpg?v=1728712164"},{"product_id":"information-security-a-practical-guide","title":"Information Security: A Practical Guide","description":"\u003cp\u003eHow do you engage with your peers when they think you're there to stop them working? Corporate information security is often hindered by a lack of adequate communication between the security team and the rest of the organization . Information security affects the whole company and is a responsibility shared by all staff, so failing to obtain wider acceptance can endanger the security of the entire organization . Many consider information security a block, not a benefit, however, and view security professionals with suspicion if not outright hostility. As a security professional, how can you get broader buy-in from your colleagues? Information Security: A Practical Guide addresses that issue by providing an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organization as a whole. Product overview Covering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, Information Security: A Practical Guide explains the basics of information security, and how to explain them to management and others so that security risks can be appropriately addressed. Topics covered include: How to understand the security culture of the organization Getting to know the organization and building relationships with key personnel How to identify gaps in the organization's security set-up The impact of compromise on the organization Identifying, categorising and prioritising risks The five levels of risk appetite and how to apply risk treatments via security controls Understanding the threats facing your organization and how to communicate them How to raise security awareness and engage with specific peer groups System mapping and documentation (including control boundaries and where risks exist) The importance of conducting regular penetration testing and what to do with the results Information security policies and processes A standards-based approach to information security If you're starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know. About the author Tom Mooney has over ten years' IT experience working with sensitive information. His current role is as a security risk advisor for the UK Government, where he works with project teams and the wider organisation to deliver key business systems securely. His key responsibility is to act as an intermediary between management and IT teams to ensure appropriate security controls are put in place. His extensive experience has led him to develop many skills and techniques to converse with people who are not technical or information security experts. Many of these skills and techniques are found in this book. He has a BSc (Hons) in information and computer security, and is also a CESG certified professional.\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041924415533,"sku":"9781849287401","price":29.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287401.jpg?v=1728712293"},{"product_id":"application-security-in-the-iso-27001-2013-environment-second-edition","title":"Application Security in the ISO 27001:2013 Environment - Second edition","description":"\u003cp\u003eWeb application security as part of an ISO27001-compliant information security management system As cyber security threats proliferate and attacks escalate, and as applications play an increasingly critical role in business, organisations urgently need to focus on web application security to protect their customers, their interests and their assets.  SMEs in particular should be very concerned about web application security: many use common, off-the-shelf applications and plugins - such as Internet Explorer, Java, Silverlight, and Adobe Reader and Flash Player - which often contain exploitable vulnerabilities.  Application Security in the ISO27001 Environment explains how organisations can implement and maintain effective security practices to protect their web applications - and the servers on which they reside - as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO27001.  The book describes the methods used by criminal hackers to attack organisations via their web applications and provides a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO27001. This second edition is updated to reflect ISO27001:2013 as well as best practices relating to cryptography, including the PCI SSC's denigration of SSL in favour of TLS.   Application Security in the ISO27001 Environment is written by Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala and Siddharth Anbalahan. Together, the authors offer a wealth of expertise in ISO27001 information security, risk management and software application development.\u003c\/p\u003e","brand":"Itgp","offers":[{"title":"Paperback","offer_id":35041972420653,"sku":"9781849287678","price":29.95,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781849287678.jpg?v=1728713196"},{"product_id":"software-engineering-in-the-systems-context","title":"Software Engineering in the Systems Context","description":"\u003cp\u003eThis book has been created to provide various perspectives concerning the problems and opportunities presented by the increasing central role of software in the world's systems. In particular, the role of and relationship between Software Engineering and Systems Engineering in the provisioning of software systems and their integration into system environments. The perspectives shed light on such aspects as driving concepts and principles, guidance on selecting development approaches, issues of complexity, stakeholder concerns and requirements, the vital role of architecture, agility, governance, resilience, trust, risk, acquisition, supply chains, technical debt, socio-technical aspects, standards, as well as the fundamental aspects of improving communication and understanding.\u003c\/p\u003e","brand":"Kings College","offers":[{"title":"Paperback","offer_id":35041973207085,"sku":"9781848901766","price":21.0,"currency_code":"GBP","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0262\/2357\/5085\/files\/9781848901766.jpg?v=1728713371"},{"product_id":"the-security-consultants-handbook","title":"The Security Consultant's Handbook","description":"\u003cp\u003eA compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author's fifteen years' experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant's Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding and business networking) Management practice (including the security function's move from basement to boardroom, fitting security into the wider context of organisational resilience, security management leadership, adding value and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cyber security (including why information needs protection, intelligence and espionage, cyber security threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organisational resilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200) Featuring case studies, checklists and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate and value-driven security services. About the author Richard Bingley is a senior lecturer in security and organisational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years' experience in a range of high-profile security and communications roles, including as a close protection operative at London's 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts (2003) and Terrorism: Just the Facts (2004).\u003c\/p\u003e","brand":"IT Governance Publishing","offers":[{"title":"Paperback","offer_id":35041973338157,"sku":"9781849287487","price":39.95,"currency_code":"GBP","in_stock":true}]}],"url":"https:\/\/www.thegreatbritishbookshop.co.uk\/collections\/technology.oembed?page=167","provider":"The Great British Bookshop","version":"1.0","type":"link"}