Safeguarding critical e-documents implementing a program for securing confidential information assets /
"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an unde...
Na minha lista:
Autor principal: | Smallwood, Robert F., 1959- |
---|---|
Autor Corporativo: | ebrary, Inc |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Hoboken, New Jersey :
Wiley,
2012.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Cyber security /
Publicado em: (2014)
Publicado em: (2014)
Cyber security and resiliency policy framework /
Publicado em: (2014)
Publicado em: (2014)
Advances in cyber security : technology, operations, and experiences /
Publicado em: (2013)
Publicado em: (2013)
Cyber conflict competing national perspectives /
Por: Ventre, Daniel
Publicado em: (2012)
Por: Ventre, Daniel
Publicado em: (2012)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado em: (2001)
Publicado em: (2001)
Cyber blockades /
Por: Russell, Alison Lawlor
Publicado em: (2014)
Por: Russell, Alison Lawlor
Publicado em: (2014)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
Por: Woody, Aaron
Publicado em: (2013)
Por: Woody, Aaron
Publicado em: (2013)
Implementing email security and tokens current standards, tools, and practices /
Por: Turner, Sean
Publicado em: (2008)
Por: Turner, Sean
Publicado em: (2008)
Security architect : careers in information security /
Por: Collins, Jon
Publicado em: (2014)
Por: Collins, Jon
Publicado em: (2014)
How to measure anything in cybersecurity risk /
Por: Hubbard, Douglas W., 1962-, et al.
Publicado em: (2016)
Por: Hubbard, Douglas W., 1962-, et al.
Publicado em: (2016)
Wars of disruption and resilience cybered conflict, power, and national security /
Por: Demchak, Chris C.
Publicado em: (2011)
Por: Demchak, Chris C.
Publicado em: (2011)
The secure online business handbook a practical guide to risk management and business continuity /
Publicado em: (2006)
Publicado em: (2006)
Implementing database security and auditing
Por: Ben-Natan, Ron
Publicado em: (2005)
Por: Ben-Natan, Ron
Publicado em: (2005)
Android security internals : an in-depth guide to android's security architecture /
Por: Elenkov, Nikolay
Publicado em: (2015)
Por: Elenkov, Nikolay
Publicado em: (2015)
Hack proofing ColdFusion
Por: Meyer, Greg
Publicado em: (2002)
Por: Meyer, Greg
Publicado em: (2002)
Control and security of E-commerce
Por: Smith, Gordon E. (Gordon Edward)
Publicado em: (2004)
Por: Smith, Gordon E. (Gordon Edward)
Publicado em: (2004)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
Por: Bradley, Tony
Publicado em: (2006)
Por: Bradley, Tony
Publicado em: (2006)
Android security cookbook /
Por: Makan, Keith
Publicado em: (2013)
Por: Makan, Keith
Publicado em: (2013)
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks /
Por: Kumar, Atul
Publicado em: (2011)
Por: Kumar, Atul
Publicado em: (2011)
Web commerce security design and development /
Por: Nahari, Hadi
Publicado em: (2011)
Por: Nahari, Hadi
Publicado em: (2011)
Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 /
Publicado em: (2001)
Publicado em: (2001)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
Por: Mularien, Peter
Publicado em: (2010)
Por: Mularien, Peter
Publicado em: (2010)
Check Point NG next generation security administration /
Publicado em: (2002)
Publicado em: (2002)
Distributed systems security issues, processes, and solutions /
Publicado em: (2009)
Publicado em: (2009)
How to cheat at designing security for a Windows Server 2003 network
Por: Amini, Rob
Publicado em: (2006)
Por: Amini, Rob
Publicado em: (2006)
Cyber security engineering : a practical approach for systems and software assurance /
Por: Mead, Nancy R.
Publicado em: (2016)
Por: Mead, Nancy R.
Publicado em: (2016)
Essentials of online payment security and fraud prevention
Por: Montague, David A., 1967-
Publicado em: (2010)
Por: Montague, David A., 1967-
Publicado em: (2010)
Cybercrime and cyberwarfare /
Por: Bernik, Igor
Publicado em: (2014)
Por: Bernik, Igor
Publicado em: (2014)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
Por: Pearson, Robert L.
Publicado em: (2007)
Por: Pearson, Robert L.
Publicado em: (2007)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
Por: Calder, Alan, 1957-
Publicado em: (2005)
Por: Calder, Alan, 1957-
Publicado em: (2005)
The misuse of information systems the impact of security countermeasures /
Por: D'Arcy, John P., 1975-
Publicado em: (2007)
Por: D'Arcy, John P., 1975-
Publicado em: (2007)
Dictionary of information security
Por: Slade, Robert
Publicado em: (2006)
Por: Slade, Robert
Publicado em: (2006)
Part-themed issue on internet security
Publicado em: (2006)
Publicado em: (2006)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Por: Li, Qing, et al.
Publicado em: (2015)
Por: Li, Qing, et al.
Publicado em: (2015)
Managing information security
Publicado em: (2010)
Publicado em: (2010)
Innocent code a security wake-up call for Web programmers /
Por: Huseby, Sverre H.
Publicado em: (2004)
Por: Huseby, Sverre H.
Publicado em: (2004)
Computer security fundamentals /
Por: Easttom, Chuck
Publicado em: (2006)
Por: Easttom, Chuck
Publicado em: (2006)
Mastering network security
Por: Brenton, Chris
Publicado em: (2003)
Por: Brenton, Chris
Publicado em: (2003)
Privacy online : OECD guidance on policy and practice.
Publicado em: (2003)
Publicado em: (2003)
Electronic safety and soundness securing finance in a new age /
Por: Glaessner, Thomas C.
Publicado em: (2004)
Por: Glaessner, Thomas C.
Publicado em: (2004)
Registos relacionados
-
Cyber security /
Publicado em: (2014) -
Cyber security and resiliency policy framework /
Publicado em: (2014) -
Advances in cyber security : technology, operations, and experiences /
Publicado em: (2013) -
Cyber conflict competing national perspectives /
Por: Ventre, Daniel
Publicado em: (2012) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado em: (2001)