Safeguarding critical e-documents implementing a program for securing confidential information assets /
"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an unde...
Sábháilte in:
Príomhchruthaitheoir: | Smallwood, Robert F., 1959- |
---|---|
Údar corparáideach: | ebrary, Inc |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Hoboken, New Jersey :
Wiley,
2012.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Cyber security /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Cyber security and resiliency policy framework /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Advances in cyber security : technology, operations, and experiences /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Cyber conflict competing national perspectives /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
Cyber blockades /
de réir: Russell, Alison Lawlor
Foilsithe / Cruthaithe: (2014)
de réir: Russell, Alison Lawlor
Foilsithe / Cruthaithe: (2014)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
de réir: Woody, Aaron
Foilsithe / Cruthaithe: (2013)
de réir: Woody, Aaron
Foilsithe / Cruthaithe: (2013)
Implementing email security and tokens current standards, tools, and practices /
de réir: Turner, Sean
Foilsithe / Cruthaithe: (2008)
de réir: Turner, Sean
Foilsithe / Cruthaithe: (2008)
Security architect : careers in information security /
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
How to measure anything in cybersecurity risk /
de réir: Hubbard, Douglas W., 1962-, et al.
Foilsithe / Cruthaithe: (2016)
de réir: Hubbard, Douglas W., 1962-, et al.
Foilsithe / Cruthaithe: (2016)
Wars of disruption and resilience cybered conflict, power, and national security /
de réir: Demchak, Chris C.
Foilsithe / Cruthaithe: (2011)
de réir: Demchak, Chris C.
Foilsithe / Cruthaithe: (2011)
The secure online business handbook a practical guide to risk management and business continuity /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Implementing database security and auditing
de réir: Ben-Natan, Ron
Foilsithe / Cruthaithe: (2005)
de réir: Ben-Natan, Ron
Foilsithe / Cruthaithe: (2005)
Android security internals : an in-depth guide to android's security architecture /
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015)
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015)
Hack proofing ColdFusion
de réir: Meyer, Greg
Foilsithe / Cruthaithe: (2002)
de réir: Meyer, Greg
Foilsithe / Cruthaithe: (2002)
Control and security of E-commerce
de réir: Smith, Gordon E. (Gordon Edward)
Foilsithe / Cruthaithe: (2004)
de réir: Smith, Gordon E. (Gordon Edward)
Foilsithe / Cruthaithe: (2004)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
Android security cookbook /
de réir: Makan, Keith
Foilsithe / Cruthaithe: (2013)
de réir: Makan, Keith
Foilsithe / Cruthaithe: (2013)
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks /
de réir: Kumar, Atul
Foilsithe / Cruthaithe: (2011)
de réir: Kumar, Atul
Foilsithe / Cruthaithe: (2011)
Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 /
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Check Point NG next generation security administration /
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Distributed systems security issues, processes, and solutions /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
How to cheat at designing security for a Windows Server 2003 network
de réir: Amini, Rob
Foilsithe / Cruthaithe: (2006)
de réir: Amini, Rob
Foilsithe / Cruthaithe: (2006)
Cyber security engineering : a practical approach for systems and software assurance /
de réir: Mead, Nancy R.
Foilsithe / Cruthaithe: (2016)
de réir: Mead, Nancy R.
Foilsithe / Cruthaithe: (2016)
Essentials of online payment security and fraud prevention
de réir: Montague, David A., 1967-
Foilsithe / Cruthaithe: (2010)
de réir: Montague, David A., 1967-
Foilsithe / Cruthaithe: (2010)
Cybercrime and cyberwarfare /
de réir: Bernik, Igor
Foilsithe / Cruthaithe: (2014)
de réir: Bernik, Igor
Foilsithe / Cruthaithe: (2014)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
de réir: Calder, Alan, 1957-
Foilsithe / Cruthaithe: (2005)
de réir: Calder, Alan, 1957-
Foilsithe / Cruthaithe: (2005)
The misuse of information systems the impact of security countermeasures /
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
de réir: Pearson, Robert L.
Foilsithe / Cruthaithe: (2007)
de réir: Pearson, Robert L.
Foilsithe / Cruthaithe: (2007)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
de réir: Li, Qing, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Li, Qing, et al.
Foilsithe / Cruthaithe: (2015)
Part-themed issue on internet security
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Dictionary of information security
de réir: Slade, Robert
Foilsithe / Cruthaithe: (2006)
de réir: Slade, Robert
Foilsithe / Cruthaithe: (2006)
Managing information security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Innocent code a security wake-up call for Web programmers /
de réir: Huseby, Sverre H.
Foilsithe / Cruthaithe: (2004)
de réir: Huseby, Sverre H.
Foilsithe / Cruthaithe: (2004)
Mastering network security
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Electronic safety and soundness securing finance in a new age /
de réir: Glaessner, Thomas C.
Foilsithe / Cruthaithe: (2004)
de réir: Glaessner, Thomas C.
Foilsithe / Cruthaithe: (2004)
Privacy online : OECD guidance on policy and practice.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
Míreanna comhchosúla
-
Cyber security /
Foilsithe / Cruthaithe: (2014) -
Cyber security and resiliency policy framework /
Foilsithe / Cruthaithe: (2014) -
Advances in cyber security : technology, operations, and experiences /
Foilsithe / Cruthaithe: (2013) -
Cyber conflict competing national perspectives /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Foilsithe / Cruthaithe: (2001)