by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
Management of information security / Whitman, Michael E., 1964-
by
Slay, Jill.
Format:
Books
Publication Date
2006
Excerpt:
Information technology security & risk management / Slay, Jill.
by
Drossos, Lambros, 1961-
Format:
Books
Publication Date
2009
Excerpt:
Digital rights management for e-commerce systems / Drossos, Lambros, 1961-
by
Schackow, Stefan, 1970-
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032278.html
Format:
Books
Publication Date
2006
Excerpt:
Professional ASP.NET 2.0 security, membership, and role management / Schackow, Stefan, 1970-
by
Peltier, Thomas R.
Format:
Books
Publication Date
2001
Excerpt:
security management / Peltier, Thomas R.
by
Stallings, William, author.
Format:
Books
Publication Date
2018
Excerpt:
-- Part Three: Management Issues -- Part Four: Cryptographic Algorithms -- Part Five: Network Security.
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
reconsider topics such as economics and management which, although interesting and important, appeal to a
by
Andress, Jason.
Format:
Books
Publication Date
2014
Excerpt:
Information resources management.
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
.Password Management: Let's Be Practical -- 3.6.Summary -- Bibliography -- ch. 4 Email Security -- 4.1
by
Bergman, Neil.
Format:
Books
Publication Date
2013
Excerpt:
-- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
Security Management / J. Hoyden / E. Albrechtsen -- 14.3.1.Formal and Informal / J. Hoyden / E. Albrechtsen
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
issues in information security -- Risk management -- Planning for security -- Security technology
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
25. Monitoring and information security incident management -- 26. Business continuity management
by
Johansson, Jesper M.
Format:
Books
Publication Date
2008
Excerpt:
management -- Securing the network -- Securing the branch office -- Small business considerations -- Securing
by
Yee, George.
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032104.html
Format:
Books
Publication Date
2006
Excerpt:
Management Architectures for E-Services -- Modeling Method for Assessing Privacy Technologies -- Legislative
by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
covers knowledge management, training and awareness, and enterprise-level software security programs
by
Egan, Mark.
Format:
Books
Publication Date
2005
Excerpt:
Information technology -- Management.
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
-- Electronic Mail Security -- IP Security -- Web Security -- Network Management Security -- System Security
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
. Cryptography -- III. System security -- 7. Backups -- 8. Defending your accounts -- 9. Integrity management
Limit Search Results
Narrowed by: