by
Slay, Jill.
Format:
Books
Publication Date
2006
Excerpt:
Information technology security & risk management / Slay, Jill.
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
by
Bergman, Neil.
Format:
Books
Publication Date
2013
Excerpt:
-- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
Contents note continued: 13.1.Risk Assessment in the Risk Management Process / S. Haugen -- 13.2
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
issues in information security -- Risk management -- Planning for security -- Security technology
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
. The risk assessment and statement of applicability -- 7. External parties -- 8. Asset management -- 9
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
Management of information security / Whitman, Michael E., 1964-
by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
1. Defining a discipline -- 2. A risk management framework -- 3. Introduction to software security
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Limit Search Results
Narrowed by: