Security metrics management how to measure the costs and benefits of security /
Gardado en:
Autor Principal: | Kovacich, Gerald L. |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros autores: | Halibozek, Edward P. |
Formato: | Electrónico eBook |
Idioma: | inglés |
Publicado: |
Burlington, MA :
Butterworth-Heinemann,
c2006.
|
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
The corporate security professional's handbook on terrorism
por: Halibozek, Edward P.
Publicado: (2008)
por: Halibozek, Edward P.
Publicado: (2008)
Effective security management
por: Sennewald, Charles A., 1931-
Publicado: (2011)
por: Sennewald, Charles A., 1931-
Publicado: (2011)
Contemporary security management
por: Fay, John, 1934-
Publicado: (2006)
por: Fay, John, 1934-
Publicado: (2006)
Security education, awareness, and training from theory to practice /
por: Roper, C. A. (Carl A.)
Publicado: (2006)
por: Roper, C. A. (Carl A.)
Publicado: (2006)
Security operations management
por: McCrie, Robert D.
Publicado: (2007)
por: McCrie, Robert D.
Publicado: (2007)
Handbook of loss prevention and crime prevention
Publicado: (2012)
Publicado: (2012)
Security design consulting the business of security system design /
por: Gouin, Brian
Publicado: (2007)
por: Gouin, Brian
Publicado: (2007)
Security manual
por: Brooksbank, David
Publicado: (2007)
por: Brooksbank, David
Publicado: (2007)
The markets for force : privatization of security across world regions /
Publicado: (2015)
Publicado: (2015)
Security supervision and management the theory and practice of asset protection /
Publicado: (2008)
Publicado: (2008)
Risk analysis and the security survey
por: Broder, James F.
Publicado: (2006)
por: Broder, James F.
Publicado: (2006)
Risk analysis and the security survey
por: Broder, James F.
Publicado: (2012)
por: Broder, James F.
Publicado: (2012)
Carry on : sound advice from schneier on security /
por: Schneier, Bruce
Publicado: (2014)
por: Schneier, Bruce
Publicado: (2014)
Mergers and acquisitions security corporate restructuring and security management /
por: Halibozek, Edward P.
Publicado: (2005)
por: Halibozek, Edward P.
Publicado: (2005)
The security economy.
Publicado: (2004)
Publicado: (2004)
Cyber threat! : how to manage the growing risk of cyber attacks /
por: Ulsch, N. MacDonnell, 1951-
Publicado: (2014)
por: Ulsch, N. MacDonnell, 1951-
Publicado: (2014)
Wireless communications security : solutions for the internet of things /
por: Penttinen, Jyrki T. J.
Publicado: (2017)
por: Penttinen, Jyrki T. J.
Publicado: (2017)
Cyber security culture : counteracting cyber threats through organizational learning and training /
por: Trim, Peter R. J.
Publicado: (2013)
por: Trim, Peter R. J.
Publicado: (2013)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
por: Pearson, Robert L.
Publicado: (2007)
por: Pearson, Robert L.
Publicado: (2007)
Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go /
por: Speed, Tim
Publicado: (2013)
por: Speed, Tim
Publicado: (2013)
Security in ad hoc and sensor networks
por: Beyah, Raheem (Raheem A.), 1976-
Publicado: (2010)
por: Beyah, Raheem (Raheem A.), 1976-
Publicado: (2010)
Strategic security management a risk assessment guide for decision makers /
por: Vellani, Karim H., 1971-
Publicado: (2007)
por: Vellani, Karim H., 1971-
Publicado: (2007)
Maritime security an introduction /
por: McNicholas, Michael
Publicado: (2008)
por: McNicholas, Michael
Publicado: (2008)
Advances in cyber security : technology, operations, and experiences /
Publicado: (2013)
Publicado: (2013)
Android security internals : an in-depth guide to android's security architecture /
por: Elenkov, Nikolay
Publicado: (2015)
por: Elenkov, Nikolay
Publicado: (2015)
Security for mobile networks and platforms
por: Aissi, Selim
Publicado: (2006)
por: Aissi, Selim
Publicado: (2006)
Network attacks & exploitation : a framework /
por: Monte, Matthew
Publicado: (2015)
por: Monte, Matthew
Publicado: (2015)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado: (2004)
por: Kaeo, Merike
Publicado: (2004)
Cyber security /
Publicado: (2014)
Publicado: (2014)
Web commerce security design and development /
por: Nahari, Hadi
Publicado: (2011)
por: Nahari, Hadi
Publicado: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
por: Mularien, Peter
Publicado: (2010)
por: Mularien, Peter
Publicado: (2010)
Strengthening maritime security through cooperation /
Publicado: (2015)
Publicado: (2015)
Container transport security across modes
Publicado: (2005)
Publicado: (2005)
Internet security and firewalls
por: Preetham, V. V.
Publicado: (2002)
por: Preetham, V. V.
Publicado: (2002)
IoT security issues /
por: Gilchrist, Alasdair
Publicado: (2017)
por: Gilchrist, Alasdair
Publicado: (2017)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
por: Chandra, Praphul
Publicado: (2005)
por: Chandra, Praphul
Publicado: (2005)
Building security rating system : checklists to assess risks, consequences, and security countermeasures /
por: Ettouney, Mohammed
Publicado: (2015)
por: Ettouney, Mohammed
Publicado: (2015)
Security in wireless LANs and MANs
por: Hardjono, Thomas
Publicado: (2005)
por: Hardjono, Thomas
Publicado: (2005)
Wireless sensor network security
Publicado: (2008)
Publicado: (2008)
Citrix xenmobile mobile device management : gain an insight into the industry's best and most secure : enterprise mobility management solution /
por: Phoenix, Akash
Publicado: (2014)
por: Phoenix, Akash
Publicado: (2014)
Títulos similares
-
The corporate security professional's handbook on terrorism
por: Halibozek, Edward P.
Publicado: (2008) -
Effective security management
por: Sennewald, Charles A., 1931-
Publicado: (2011) -
Contemporary security management
por: Fay, John, 1934-
Publicado: (2006) -
Security education, awareness, and training from theory to practice /
por: Roper, C. A. (Carl A.)
Publicado: (2006) -
Security operations management
por: McCrie, Robert D.
Publicado: (2007)