15 Results Found Subscribe to search results
000000000000000IIE
Print
by 
Slay, Jill.
Format: 
Books
Publication Date 
2006
Excerpt: 
Information technology security & risk management / Slay, Jill.
Available: Copies:
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Managing risk in information systems / Gibson, Darril.
Available: Copies:
3. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more
Available: Copies:
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self
Available: Copies:
by 
Maiwald, Eric.
Format: 
Books
Publication Date 
2013
Excerpt: 
techniques ; Information security services -- pt. II. Groundwork. ; Policy ; Managing risk ; Information
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
issues in information security -- Risk management -- Planning for security -- Security technology
Available: Copies:
by 
Wiles, Jack.
Format: 
Books
Publication Date 
2012
Excerpt: 
training: your most valuable countermeasure to employee risk.
Available: Copies:
8. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
, Threats, Sources, and Events / S. Haugen -- 13.2.4.Risk Analysis, Risk Evaluation, and Risk Assessment / S
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
Available: Copies:
10. 
Cover image for Management of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8
Available: Copies:
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
. The risk assessment and statement of applicability -- 7. External parties -- 8. Asset management -- 9
Available: Copies:
by 
Criddle, Linda.
Format: 
Books
Publication Date 
2006
Excerpt: 
not, and how taking a few precautions can help your children avoid putting themselves at risk
Available: Copies:
13. 
Cover image for Software security : building security in
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
Available: Copies:
by 
Chase, Kate.
Format: 
Books
Publication Date 
2003
Excerpt: 
limit the risk of damage and disruption, how to restart a problem PC, what to do when upgrades go wrong
Available: Copies:
15. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available: Copies:
Limit Search Results
Access Level
Format
Language
Item Available