20 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2018
Excerpt: 
6
Available: Copies:
2. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
6
Available: Copies:
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2016
Excerpt: 
6
Available: Copies:
4. 
Cover image for Hardware security : design, threats, and safeguards
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions.
Available: Copies:
5. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Sniffing -- 3.3.5.Attacker Guesses Password -- 3.3.6.Exposed Password File -- 3.3.7.Security Questions -- 3
Available: Copies:
6. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Contents note continued: 5.6.Technology / D.R. Hjelme / V. Makarov / L. Lydersen -- 5.6.1.Single
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
6
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8
Available: Copies:
10. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
-Oxley -- 3. ISO27001 -- 4. Organizing information security -- 5. Information security policy and scope -- 6
Available: Copies:
11. 
Cover image for Microsoft® Windows server 2008 security resource kit
by 
Johansson, Jesper M.
Format: 
Books
Publication Date 
2008
Excerpt: 
6
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
operating systems -- Ch. 6. Database and data mining security -- Ch. 7. Security in networks -- Ch. 8
Available: Copies:
Limit Search Results
Access Level
Format
Language
Item Available