9 Results Found Subscribe to search results
000000000IIE
Print
1. 
Cover image for Information technology security & risk management
by 
Slay, Jill.
Format: 
Books
Publication Date 
2006
Excerpt: 
Information technology security & risk management / Slay, Jill.
Available: Copies:
2. 
Cover image for Computer security : principles and practice
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2018
Excerpt: 
-- Part Three: Management Issues -- Part Four: Cryptographic Algorithms -- Part Five: Network Security.
Available: Copies:
3. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
Information technology -- Security measures.
Available: Copies:
4. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
TECHNOLOGY & ENGINEERING / Electrical.
Available: Copies:
5. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other
Available: Copies:
6. 
Cover image for Privacy protection for e-services
by 
Yee, George.
Format: 
Books
Publication Date 
2006
Excerpt: 
Management Architectures for E-Services -- Modeling Method for Assessing Privacy Technologies -- Legislative
Available: Copies:
7. 
Cover image for The executive guide to information security : threats, challenges, and solutions
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
Information technology -- Management.
Available: Copies:
8. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
Available: Copies:
9. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available: Copies:
Limit Search Results
Access Level
Format
Material Type
Language
Shelf Location
Publication Date
Item Available