23 Results Found Subscribe to search results
00000000000IIE
Print
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Security Management / J. Hoyden / E. Albrechtsen -- 14.3.1.Formal and Informal / J. Hoyden / E. Albrechtsen
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
Available: Copies:
15. 
Cover image for Microsoft® Windows server 2008 security resource kit
by 
Johansson, Jesper M.
Format: 
Books
Publication Date 
2008
Excerpt: 
management -- Securing the network -- Securing the branch office -- Small business considerations -- Securing
Available: Copies:
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
25. Monitoring and information security incident management -- 26. Business continuity management
Available: Copies:
17. 
Cover image for Privacy protection for e-services
by 
Yee, George.
Format: 
Books
Publication Date 
2006
Excerpt: 
Management Architectures for E-Services -- Modeling Method for Assessing Privacy Technologies -- Legislative
Available: Copies:
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
covers knowledge management, training and awareness, and enterprise-level software security programs
Available: Copies:
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
Information technology -- Management.
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2003
Excerpt: 
-- Electronic Mail Security -- IP Security -- Web Security -- Network Management Security -- System Security
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
Available: Copies:
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
. Cryptography -- III. System security -- 7. Backups -- 8. Defending your accounts -- 9. Integrity management
Available: Copies:
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available: Copies:
Limit Search Results
Access Level
Format
Language
Subject
Item Available