by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
Security Management / J. Hoyden / E. Albrechtsen -- 14.3.1.Formal and Informal / J. Hoyden / E. Albrechtsen
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
by
Johansson, Jesper M.
Format:
Books
Publication Date
2008
Excerpt:
management -- Securing the network -- Securing the branch office -- Small business considerations -- Securing
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
25. Monitoring and information security incident management -- 26. Business continuity management
by
Yee, George.
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032104.html
Format:
Books
Publication Date
2006
Excerpt:
Management Architectures for E-Services -- Modeling Method for Assessing Privacy Technologies -- Legislative
by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
covers knowledge management, training and awareness, and enterprise-level software security programs
by
Egan, Mark.
Format:
Books
Publication Date
2005
Excerpt:
Information technology -- Management.
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
-- Electronic Mail Security -- IP Security -- Web Security -- Network Management Security -- System Security
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
. Cryptography -- III. System security -- 7. Backups -- 8. Defending your accounts -- 9. Integrity management
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Limit Search Results
Narrowed by: