Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Brouwer, Riemer
ADCO
Abu Dhabi, United Arab Emirates
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Riemer Brouwer has over 13 years of experience in IT audit and IT consultancy. Throughout his career, Riemer has specialized in IT reviews that incorporate not only technical viewpoints, but financial/administrative and organizational considerations as well.

A major part of Riemer’s work deals with improving the relationship between IT and business processes in order to optimize and ensure that IT investments are fully beneficial to the core processes of an organization.

Riemer, who is Dutch, worked in The Netherlands for the first six years of his career. This provided him with a solid foundation for, and experience in, IT audit. Currently, he works with Booz & Company in the Middle East in the information security field.

Riemer’s clients are mostly found in the financial industry, which has given him the opportunity to gain a thorough understanding of the underlying business processes, knowledge that enhances the quality and depth of IT audit activities. In addition, Riemer has been a leading IT auditor for telecom companies in Lebanon, Syria, and the Kingdom of Saudi Arabia. He has also worked with local and national governments, airlines, and institutions of higher education.

Riemer has an in-depth knowledge of the challenges surrounding implementation projects. Both in the Middle East and in The Netherlands, Riemer has demonstrated an excellent commitment to achieving solutions that are practical and secure.

 
 
Options:
Date Reviewed  
 
1
- 10 of 33 reviews

   
  Beginning breadboarding: physical computing and the basic building blocks of computers
Fox J., Apress, New York, NY, 2023. 495 pp.  Type: Book (9781484292174)

The maker movement is getting more popular, possibly fueled by the recent coronavirus crisis that left many of us searching for new indoor activities. A niche within this field is electronics, with quite a few books available that teach the basics...

Jan 10 2024  
  Canary Analysis Service
Davidovič Š., Beyer B. Queue 16(1): 35-57, 2018.  Type: Article

Canary analysis is based on the age-old principle of bringing canaries into coal mines to detect possible air quality issues. Because canaries are more sensitive to pollution than humans, they serve as an early warning sign of possible...

Mar 5 2020  
   Professional red teaming: conducting successful cybersecurity engagements
Oakley J., Apress, New York, NY, 2019. 232 pp.  Type: Book (978-1-484243-08-4)

Technical books about red teaming, or ethical hacking in general, run the risk of being outdated by the time they get published. New threats will have occurred, for example, making the attack specifics invalid. Thus, the author of this...

Feb 20 2020  
   The blueprint: hacking/Python: 2 books in 1
CyberPunk Architects ., CreateSpace Independent Publishing Platform, Charleston, SC, 2017. 150 pp.  Type: Book (978-1-545444-19-1)

This “beginner’s guide to everything you need to know”--as the authors call it--is anything but that. It seems to be randomly copy and pasted from Wikipedia and other sources, and is outd...

Aug 15 2018  
  Bitcoin’s academic pedigree
Narayanan A., Clark J. Queue 15(4): 1-30, 2017.  Type: Article

In this highly readable article, the authors Arvind Narayanan and Jeremy Clark search for the academic origins of the concept behind Bitcoin and blockchain technology....

May 24 2018  
   Digital privacy and security using Windows: a practical guide
Hassan N., Hijazi R., Apress, New York, NY, 2017. 284 pp.  Type: Book (978-1-484227-98-5)

Anyone who is not worried about personal privacy on the Internet should read this book, as it makes painfully clear how easy our privacy is compromised by various players. Likewise, those who think they are aware of this already should...

Apr 4 2018  
  Kubernetes management design patterns: with Docker, CoreOS Linux, and other platforms
Vohra D., Apress, New York, NY, 2017. 399 pp.  Type: Book (978-1-484225-97-4)

According to the Kubernetes website [1], Kubernetes is “an open-source system for automating deployment, scaling, and management of containerized applications.” If this sounds somewhat abstract, Vohra’s bo...

Nov 29 2017  
   The psychology of information security
Zinatullin L., It Governance Ltd, Ely, UK, 2016. 128 pp.  Type: Book (978-1-849287-89-0)

With the increase of ever-advancing technology, the field of information security has seemingly overlooked a crucial factor: humans. This book aims to address this lacuna by describing the role of human psychology with respect to secur...

Aug 15 2017  
   Implementing Splunk: big data reporting and development for operational intelligence
Bumgarner V., Packt Publishing, Birmingham, UK, 2013. 448 pp.  Type: Book (978-1-849693-28-8)

Big data, and the challenge to make sense of it, is becoming increasingly important to larger companies. Since big data comes in a variety of forms, dedicated solutions have been launched to help organizations process it....

Dec 23 2014  
  Makers at work: folks reinventing the world one object or idea at a time
Osborn S., Apress, Berkeley, CA, 2013. 324 pp.  Type: Book (978-1-430259-92-3)

Through a series of interviews, this book covers the rise of a new phenomenon: the maker movement. As the back cover states:...

Mar 25 2014  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy