Safeguarding critical e-documents implementing a program for securing confidential information assets /
"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an unde...
Guardat en:
Autor principal: | Smallwood, Robert F., 1959- |
---|---|
Autor corporatiu: | ebrary, Inc |
Format: | Electrònic eBook |
Idioma: | anglès |
Publicat: |
Hoboken, New Jersey :
Wiley,
2012.
|
Matèries: | |
Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
Cyber security /
Publicat: (2014)
Publicat: (2014)
Cyber security and resiliency policy framework /
Publicat: (2014)
Publicat: (2014)
Advances in cyber security : technology, operations, and experiences /
Publicat: (2013)
Publicat: (2013)
Cyber conflict competing national perspectives /
per: Ventre, Daniel
Publicat: (2012)
per: Ventre, Daniel
Publicat: (2012)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicat: (2001)
Publicat: (2001)
Cyber blockades /
per: Russell, Alison Lawlor
Publicat: (2014)
per: Russell, Alison Lawlor
Publicat: (2014)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
per: Woody, Aaron
Publicat: (2013)
per: Woody, Aaron
Publicat: (2013)
Implementing email security and tokens current standards, tools, and practices /
per: Turner, Sean
Publicat: (2008)
per: Turner, Sean
Publicat: (2008)
Security architect : careers in information security /
per: Collins, Jon
Publicat: (2014)
per: Collins, Jon
Publicat: (2014)
How to measure anything in cybersecurity risk /
per: Hubbard, Douglas W., 1962-, et al.
Publicat: (2016)
per: Hubbard, Douglas W., 1962-, et al.
Publicat: (2016)
The secure online business handbook a practical guide to risk management and business continuity /
Publicat: (2006)
Publicat: (2006)
Wars of disruption and resilience cybered conflict, power, and national security /
per: Demchak, Chris C.
Publicat: (2011)
per: Demchak, Chris C.
Publicat: (2011)
Implementing database security and auditing
per: Ben-Natan, Ron
Publicat: (2005)
per: Ben-Natan, Ron
Publicat: (2005)
Android security internals : an in-depth guide to android's security architecture /
per: Elenkov, Nikolay
Publicat: (2015)
per: Elenkov, Nikolay
Publicat: (2015)
Hack proofing ColdFusion
per: Meyer, Greg
Publicat: (2002)
per: Meyer, Greg
Publicat: (2002)
Control and security of E-commerce
per: Smith, Gordon E. (Gordon Edward)
Publicat: (2004)
per: Smith, Gordon E. (Gordon Edward)
Publicat: (2004)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
per: Bradley, Tony
Publicat: (2006)
per: Bradley, Tony
Publicat: (2006)
Android security cookbook /
per: Makan, Keith
Publicat: (2013)
per: Makan, Keith
Publicat: (2013)
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks /
per: Kumar, Atul
Publicat: (2011)
per: Kumar, Atul
Publicat: (2011)
Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 /
Publicat: (2001)
Publicat: (2001)
Web commerce security design and development /
per: Nahari, Hadi
Publicat: (2011)
per: Nahari, Hadi
Publicat: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
per: Mularien, Peter
Publicat: (2010)
per: Mularien, Peter
Publicat: (2010)
Check Point NG next generation security administration /
Publicat: (2002)
Publicat: (2002)
Distributed systems security issues, processes, and solutions /
Publicat: (2009)
Publicat: (2009)
How to cheat at designing security for a Windows Server 2003 network
per: Amini, Rob
Publicat: (2006)
per: Amini, Rob
Publicat: (2006)
Cyber security engineering : a practical approach for systems and software assurance /
per: Mead, Nancy R.
Publicat: (2016)
per: Mead, Nancy R.
Publicat: (2016)
Essentials of online payment security and fraud prevention
per: Montague, David A., 1967-
Publicat: (2010)
per: Montague, David A., 1967-
Publicat: (2010)
Cybercrime and cyberwarfare /
per: Bernik, Igor
Publicat: (2014)
per: Bernik, Igor
Publicat: (2014)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
per: Calder, Alan, 1957-
Publicat: (2005)
per: Calder, Alan, 1957-
Publicat: (2005)
The misuse of information systems the impact of security countermeasures /
per: D'Arcy, John P., 1975-
Publicat: (2007)
per: D'Arcy, John P., 1975-
Publicat: (2007)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
per: Pearson, Robert L.
Publicat: (2007)
per: Pearson, Robert L.
Publicat: (2007)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
per: Li, Qing, et al.
Publicat: (2015)
per: Li, Qing, et al.
Publicat: (2015)
Part-themed issue on internet security
Publicat: (2006)
Publicat: (2006)
Dictionary of information security
per: Slade, Robert
Publicat: (2006)
per: Slade, Robert
Publicat: (2006)
Managing information security
Publicat: (2010)
Publicat: (2010)
Innocent code a security wake-up call for Web programmers /
per: Huseby, Sverre H.
Publicat: (2004)
per: Huseby, Sverre H.
Publicat: (2004)
Computer security fundamentals /
per: Easttom, Chuck
Publicat: (2006)
per: Easttom, Chuck
Publicat: (2006)
Mastering network security
per: Brenton, Chris
Publicat: (2003)
per: Brenton, Chris
Publicat: (2003)
Electronic safety and soundness securing finance in a new age /
per: Glaessner, Thomas C.
Publicat: (2004)
per: Glaessner, Thomas C.
Publicat: (2004)
Privacy online : OECD guidance on policy and practice.
Publicat: (2003)
Publicat: (2003)
Ítems similars
-
Cyber security /
Publicat: (2014) -
Cyber security and resiliency policy framework /
Publicat: (2014) -
Advances in cyber security : technology, operations, and experiences /
Publicat: (2013) -
Cyber conflict competing national perspectives /
per: Ventre, Daniel
Publicat: (2012) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicat: (2001)