by
Stallings, William, author.
Format:
Books
Publication Date
2018
Excerpt:
-- Part Three: Management Issues -- Part Four: Cryptographic Algorithms -- Part Five: Network Security.
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
-- Management and incidents -- Legal issues and ethics -- Details of cryptography -- Emerging topics.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
issues in information security -- Risk management -- Planning for security -- Security technology
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
25. Monitoring and information security incident management -- 26. Business continuity management
by
Yee, George.
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032104.html
Format:
Books
Publication Date
2006
Excerpt:
Management Architectures for E-Services -- Modeling Method for Assessing Privacy Technologies -- Legislative
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in
Limit Search Results
Narrowed by: