7 Results Found Subscribe to search results
0000000IIE
Print
1. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
Available: Copies:
2. 
Cover image for Hardware security : design, threats, and safeguards
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
Hardware security : design, threats, and safeguards / Mukhopadhyay, Debdeep.
Available: Copies:
3. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Online: The Human Threat -- 12.1.Introduction -- 12.2.The Differences Between Cyberspace and the Physical
Available: Copies:
4. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
, Threats, Sources, and Events / S. Haugen -- 13.2.4.Risk Analysis, Risk Evaluation, and Risk Assessment / S
Available: Copies:
5. 
Cover image for Low tech hacking : street smarts for security professionals
by 
Wiles, Jack.
Format: 
Books
Publication Date 
2012
Excerpt: 
Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical
Available: Copies:
6. 
Cover image for The executive guide to information security : threats, challenges, and solutions
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
The executive guide to information security : threats, challenges, and solutions / Egan, Mark.
Available: Copies:
7. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available: Copies:
Limit Search Results
Access Level
Format
Item Category 1
Language
Publication Date
Item Available