10 Results Found Subscribe to search results
0000000000IIE
Print
1. 
Cover image for Information technology security & risk management
by 
Slay, Jill.
Format: 
Books
Publication Date 
2006
Excerpt: 
Information technology security & risk management / Slay, Jill.
Available: Copies:
2. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
Available: Copies:
3. 
Cover image for Hacking exposed : mobile security secrets & solutions
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
-- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile
Available: Copies:
4. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Contents note continued: 13.1.Risk Assessment in the Risk Management Process / S. Haugen -- 13.2
Available: Copies:
5. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
issues in information security -- Risk management -- Planning for security -- Security technology
Available: Copies:
6. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
Available: Copies:
7. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
. The risk assessment and statement of applicability -- 7. External parties -- 8. Asset management -- 9
Available: Copies:
8. 
Cover image for Management of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
Management of information security / Whitman, Michael E., 1964-
Available: Copies:
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
1. Defining a discipline -- 2. A risk management framework -- 3. Introduction to software security
Available: Copies:
10. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available: Copies:
Limit Search Results
Access Level
Format
Language
Publication Date
Item Available