Searching Books & More : "Electronic books"

Computer security X Information technology X
20 results found in Books & More
RSS
Cover images provided by Open Library

Algorithms, architectures and information systems security

Published: New Jersey : World Scientific, c2009
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The basics of IT audit Purposes, processes, and practical information

Published: Waltham, MA : Syngress, 2014
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Selling information security to the board a primer

Published: Ely : IT Governance Pub., 2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Dictionary of information security

Published: Rockland, MA : Syngress Pub., c2006
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

IT security policy management usage patterns using IBM Tivoli Security Policy Manager

Published: Poughkeepsie, NY : IBM Corp., International Technical Support Organization, c2011
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Power and security in the information age investigating the role of the state in cyberspace

Published: Aldershot, Hants, England ; Burlington, VT : Ashgate, c2007
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Using the IBM Security Framework and IBM Security Blueprint to realize business-driven security

Published: Poughkeepsie, NY : IBM Corp., International Technical Support Organization, 2013
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Ten rules of information security for the smaller business a plain English guide

Published: Ely, U.K. : IT Governance, 2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cyber security policy guidebook

Published: Hoboken, N.J. : Wiley, c2012
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

IT Governance Guidelines for Directors

Published: Ely : IT Governance Pub., 2005
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Once more unto the breach managing information security in an uncertain world

Published: [Ely, Cambridgeshire], U.K. : IT Governance Pub., 2012 (Norwood, Mass. : Books24x7.com [generator])
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)

Published: Upper Saddle River, NJ : Addison-Wesley, c2012
Format: Electronic Resource, Remote
Retrieving Holdings Information