Contemporary security management
Sábháilte in:
Príomhchruthaitheoir: | Fay, John, 1934- |
---|---|
Údar corparáideach: | ebrary, Inc |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Amsterdam ; Boston :
Elsevier/Butterworth-Heinemann,
c2006.
|
Eagrán: | 2nd ed. |
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Effective security management
de réir: Sennewald, Charles A., 1931-
Foilsithe / Cruthaithe: (2011)
de réir: Sennewald, Charles A., 1931-
Foilsithe / Cruthaithe: (2011)
Security metrics management how to measure the costs and benefits of security /
de réir: Kovacich, Gerald L.
Foilsithe / Cruthaithe: (2006)
de réir: Kovacich, Gerald L.
Foilsithe / Cruthaithe: (2006)
Security operations management
de réir: McCrie, Robert D.
Foilsithe / Cruthaithe: (2007)
de réir: McCrie, Robert D.
Foilsithe / Cruthaithe: (2007)
The corporate security professional's handbook on terrorism
de réir: Halibozek, Edward P.
Foilsithe / Cruthaithe: (2008)
de réir: Halibozek, Edward P.
Foilsithe / Cruthaithe: (2008)
Security education, awareness, and training from theory to practice /
de réir: Roper, C. A. (Carl A.)
Foilsithe / Cruthaithe: (2006)
de réir: Roper, C. A. (Carl A.)
Foilsithe / Cruthaithe: (2006)
Handbook of loss prevention and crime prevention
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Security supervision and management the theory and practice of asset protection /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
The markets for force : privatization of security across world regions /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
Security manual
de réir: Brooksbank, David
Foilsithe / Cruthaithe: (2007)
de réir: Brooksbank, David
Foilsithe / Cruthaithe: (2007)
Security design consulting the business of security system design /
de réir: Gouin, Brian
Foilsithe / Cruthaithe: (2007)
de réir: Gouin, Brian
Foilsithe / Cruthaithe: (2007)
Risk analysis and the security survey
de réir: Broder, James F.
Foilsithe / Cruthaithe: (2006)
de réir: Broder, James F.
Foilsithe / Cruthaithe: (2006)
Risk analysis and the security survey
de réir: Broder, James F.
Foilsithe / Cruthaithe: (2012)
de réir: Broder, James F.
Foilsithe / Cruthaithe: (2012)
The security economy.
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Carry on : sound advice from schneier on security /
de réir: Schneier, Bruce
Foilsithe / Cruthaithe: (2014)
de réir: Schneier, Bruce
Foilsithe / Cruthaithe: (2014)
Strategic security management a risk assessment guide for decision makers /
de réir: Vellani, Karim H., 1971-
Foilsithe / Cruthaithe: (2007)
de réir: Vellani, Karim H., 1971-
Foilsithe / Cruthaithe: (2007)
Towards a coordinated security approach between private security firms and the police service in Kenya /
de réir: Inoti, Pamela N.
Foilsithe / Cruthaithe: (2015)
de réir: Inoti, Pamela N.
Foilsithe / Cruthaithe: (2015)
Industrial security : managing security in the 21st century /
de réir: Russell, David L., 1942-, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Russell, David L., 1942-, et al.
Foilsithe / Cruthaithe: (2015)
Managing information security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
How to cheat at managing information security
de réir: Osborne, Mark
Foilsithe / Cruthaithe: (2006)
de réir: Osborne, Mark
Foilsithe / Cruthaithe: (2006)
Security architect : careers in information security /
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
Victory for hire private security companies' impact on military effectiveness /
de réir: Dunigan, Molly
Foilsithe / Cruthaithe: (2011)
de réir: Dunigan, Molly
Foilsithe / Cruthaithe: (2011)
Security convergence managing enterprise security risk /
de réir: Tyson, Dave
Foilsithe / Cruthaithe: (2007)
de réir: Tyson, Dave
Foilsithe / Cruthaithe: (2007)
Managing the human factor in information security how to win over staff and influence business managers /
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)
Maritime security an introduction /
de réir: McNicholas, Michael
Foilsithe / Cruthaithe: (2008)
de réir: McNicholas, Michael
Foilsithe / Cruthaithe: (2008)
Nuclear security culture from national best practices to international standards /
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Advances in cyber security : technology, operations, and experiences /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Security risk management building an information security risk management program from the ground up /
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
Cyber security /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Designing network security : a practical guide to creating a secure network infrastructure /
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Internet security and firewalls
de réir: Preetham, V. V.
Foilsithe / Cruthaithe: (2002)
de réir: Preetham, V. V.
Foilsithe / Cruthaithe: (2002)
IoT security issues /
de réir: Gilchrist, Alasdair
Foilsithe / Cruthaithe: (2017)
de réir: Gilchrist, Alasdair
Foilsithe / Cruthaithe: (2017)
Strengthening maritime security through cooperation /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
Container transport security across modes
Foilsithe / Cruthaithe: (2005)
Foilsithe / Cruthaithe: (2005)
Wireless communications security : solutions for the internet of things /
de réir: Penttinen, Jyrki T. J.
Foilsithe / Cruthaithe: (2017)
de réir: Penttinen, Jyrki T. J.
Foilsithe / Cruthaithe: (2017)
Wireless sensor network security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
de réir: Pearson, Robert L.
Foilsithe / Cruthaithe: (2007)
de réir: Pearson, Robert L.
Foilsithe / Cruthaithe: (2007)
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
de réir: El-Bawab, Abd El-Monem A.
Foilsithe / Cruthaithe: (2014)
de réir: El-Bawab, Abd El-Monem A.
Foilsithe / Cruthaithe: (2014)
Web security basics
de réir: Bhasin, Shweta, 1977-
Foilsithe / Cruthaithe: (2003)
de réir: Bhasin, Shweta, 1977-
Foilsithe / Cruthaithe: (2003)
Míreanna comhchosúla
-
Effective security management
de réir: Sennewald, Charles A., 1931-
Foilsithe / Cruthaithe: (2011) -
Security metrics management how to measure the costs and benefits of security /
de réir: Kovacich, Gerald L.
Foilsithe / Cruthaithe: (2006) -
Security operations management
de réir: McCrie, Robert D.
Foilsithe / Cruthaithe: (2007) -
The corporate security professional's handbook on terrorism
de réir: Halibozek, Edward P.
Foilsithe / Cruthaithe: (2008) -
Security education, awareness, and training from theory to practice /
de réir: Roper, C. A. (Carl A.)
Foilsithe / Cruthaithe: (2006)