|
|
|
|
| Riemer Brouwer has over 13 years of experience in IT audit and IT consultancy. Throughout his career, Riemer has specialized in IT reviews that incorporate not only technical viewpoints, but financial/administrative and organizational considerations as well. A major part of Riemer’s work deals with improving the relationship between IT and business processes in order to optimize and ensure that IT investments are fully beneficial to the core processes of an organization. Riemer, who is Dutch, worked in The Netherlands for the first six years of his career. This provided him with a solid foundation for, and experience in, IT audit. Currently, he works with Booz & Company in the Middle East in the information security field. Riemer’s clients are mostly found in the financial industry, which has given him the opportunity to gain a thorough understanding of the underlying business processes, knowledge that enhances the quality and depth of IT audit activities. In addition, Riemer has been a leading IT auditor for telecom companies in Lebanon, Syria, and the Kingdom of Saudi Arabia. He has also worked with local and national governments, airlines, and institutions of higher education. Riemer has an in-depth knowledge of the challenges surrounding implementation projects. Both in the Middle East and in The Netherlands, Riemer has demonstrated an excellent commitment to achieving solutions that are practical and secure. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 33
reviews
|
|
|
|
|
|
|
|
Beginning breadboarding: physical computing and the basic building blocks of computers Fox J., Apress, New York, NY, 2023. 495 pp. Type: Book (9781484292174) The maker movement is getting more popular, possibly fueled by the recent coronavirus crisis that left many of us searching for new indoor activities. A niche within this field is electronics, with quite a few books available that teach the basics...
|
Jan 10 2024 |
|
|
|
|
|
|
Canary Analysis Service Davidovič Š., Beyer B. Queue 16(1): 35-57, 2018. Type: Article
Canary analysis is based on the age-old principle of bringing canaries into coal mines to detect possible air quality issues. Because canaries are more sensitive to pollution than humans, they serve as an early warning sign of possible...
|
Mar 5 2020 |
|
|
|
|
|
|
Professional red teaming: conducting successful cybersecurity engagements Oakley J., Apress, New York, NY, 2019. 232 pp. Type: Book (978-1-484243-08-4)
Technical books about red teaming, or ethical hacking in general, run the risk of being outdated by the time they get published. New threats will have occurred, for example, making the attack specifics invalid. Thus, the author of this...
|
Feb 20 2020 |
|
|
|
|
|
|
The blueprint: hacking/Python: 2 books in 1 CyberPunk Architects ., CreateSpace Independent Publishing Platform, Charleston, SC, 2017. 150 pp. Type: Book (978-1-545444-19-1)
This “beginner’s guide to everything you need to know”--as the authors call it--is anything but that. It seems to be randomly copy and pasted from Wikipedia and other sources, and is outd...
|
Aug 15 2018 |
|
|
|
|
|
|
Bitcoin’s academic pedigree Narayanan A., Clark J. Queue 15(4): 1-30, 2017. Type: Article
In this highly readable article, the authors Arvind Narayanan and Jeremy Clark search for the academic origins of the concept behind Bitcoin and blockchain technology....
|
May 24 2018 |
|
|
|
|
|
|
Digital privacy and security using Windows: a practical guide Hassan N., Hijazi R., Apress, New York, NY, 2017. 284 pp. Type: Book (978-1-484227-98-5)
Anyone who is not worried about personal privacy on the Internet should read this book, as it makes painfully clear how easy our privacy is compromised by various players. Likewise, those who think they are aware of this already should...
|
Apr 4 2018 |
|
|
|
|
|
|
Kubernetes management design patterns: with Docker, CoreOS Linux, and other platforms Vohra D., Apress, New York, NY, 2017. 399 pp. Type: Book (978-1-484225-97-4)
According to the Kubernetes website [1], Kubernetes is “an open-source system for automating deployment, scaling, and management of containerized applications.” If this sounds somewhat abstract, Vohra’s bo...
|
Nov 29 2017 |
|
|
|
|
|
|
The psychology of information security Zinatullin L., It Governance Ltd, Ely, UK, 2016. 128 pp. Type: Book (978-1-849287-89-0)
With the increase of ever-advancing technology, the field of information security has seemingly overlooked a crucial factor: humans. This book aims to address this lacuna by describing the role of human psychology with respect to secur...
|
Aug 15 2017 |
|
|
|
|
|
|
Implementing Splunk: big data reporting and development for operational intelligence Bumgarner V., Packt Publishing, Birmingham, UK, 2013. 448 pp. Type: Book (978-1-849693-28-8)
Big data, and the challenge to make sense of it, is becoming increasingly important to larger companies. Since big data comes in a variety of forms, dedicated solutions have been launched to help organizations process it....
|
Dec 23 2014 |
|
|
|
|
|
|
Makers at work: folks reinventing the world one object or idea at a time Osborn S., Apress, Berkeley, CA, 2013. 324 pp. Type: Book (978-1-430259-92-3)
Through a series of interviews, this book covers the rise of a new phenomenon: the maker movement. As the back cover states:...
|
Mar 25 2014 |
|
|
|
|
|
|
|
|
|
|
|