Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Identifies potential threats associated with software developments. The text also explains how to establish an effective risk management programme and details critical steps involved, including asset valuation, security threat identification, security and control testing, and safeguard assessment.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.