Safeguarding critical e-documents implementing a program for securing confidential information assets /
"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an unde...
Сохранить в:
Главный автор: | Smallwood, Robert F., 1959- |
---|---|
Соавтор: | ebrary, Inc |
Формат: | Электронный ресурс eКнига |
Язык: | английский |
Опубликовано: |
Hoboken, New Jersey :
Wiley,
2012.
|
Предметы: | |
Online-ссылка: | An electronic book accessible through the World Wide Web; click to view |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
Cyber security /
Опубликовано: (2014)
Опубликовано: (2014)
Cyber security and resiliency policy framework /
Опубликовано: (2014)
Опубликовано: (2014)
Advances in cyber security : technology, operations, and experiences /
Опубликовано: (2013)
Опубликовано: (2013)
Cyber conflict competing national perspectives /
по: Ventre, Daniel
Опубликовано: (2012)
по: Ventre, Daniel
Опубликовано: (2012)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Опубликовано: (2001)
Опубликовано: (2001)
Cyber blockades /
по: Russell, Alison Lawlor
Опубликовано: (2014)
по: Russell, Alison Lawlor
Опубликовано: (2014)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
по: Woody, Aaron
Опубликовано: (2013)
по: Woody, Aaron
Опубликовано: (2013)
Implementing email security and tokens current standards, tools, and practices /
по: Turner, Sean
Опубликовано: (2008)
по: Turner, Sean
Опубликовано: (2008)
Security architect : careers in information security /
по: Collins, Jon
Опубликовано: (2014)
по: Collins, Jon
Опубликовано: (2014)
How to measure anything in cybersecurity risk /
по: Hubbard, Douglas W., 1962-, и др.
Опубликовано: (2016)
по: Hubbard, Douglas W., 1962-, и др.
Опубликовано: (2016)
Wars of disruption and resilience cybered conflict, power, and national security /
по: Demchak, Chris C.
Опубликовано: (2011)
по: Demchak, Chris C.
Опубликовано: (2011)
The secure online business handbook a practical guide to risk management and business continuity /
Опубликовано: (2006)
Опубликовано: (2006)
Implementing database security and auditing
по: Ben-Natan, Ron
Опубликовано: (2005)
по: Ben-Natan, Ron
Опубликовано: (2005)
Android security internals : an in-depth guide to android's security architecture /
по: Elenkov, Nikolay
Опубликовано: (2015)
по: Elenkov, Nikolay
Опубликовано: (2015)
Hack proofing ColdFusion
по: Meyer, Greg
Опубликовано: (2002)
по: Meyer, Greg
Опубликовано: (2002)
Control and security of E-commerce
по: Smith, Gordon E. (Gordon Edward)
Опубликовано: (2004)
по: Smith, Gordon E. (Gordon Edward)
Опубликовано: (2004)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
по: Bradley, Tony
Опубликовано: (2006)
по: Bradley, Tony
Опубликовано: (2006)
Android security cookbook /
по: Makan, Keith
Опубликовано: (2013)
по: Makan, Keith
Опубликовано: (2013)
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks /
по: Kumar, Atul
Опубликовано: (2011)
по: Kumar, Atul
Опубликовано: (2011)
Web commerce security design and development /
по: Nahari, Hadi
Опубликовано: (2011)
по: Nahari, Hadi
Опубликовано: (2011)
Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 /
Опубликовано: (2001)
Опубликовано: (2001)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
по: Mularien, Peter
Опубликовано: (2010)
по: Mularien, Peter
Опубликовано: (2010)
Check Point NG next generation security administration /
Опубликовано: (2002)
Опубликовано: (2002)
Distributed systems security issues, processes, and solutions /
Опубликовано: (2009)
Опубликовано: (2009)
How to cheat at designing security for a Windows Server 2003 network
по: Amini, Rob
Опубликовано: (2006)
по: Amini, Rob
Опубликовано: (2006)
Cyber security engineering : a practical approach for systems and software assurance /
по: Mead, Nancy R.
Опубликовано: (2016)
по: Mead, Nancy R.
Опубликовано: (2016)
Essentials of online payment security and fraud prevention
по: Montague, David A., 1967-
Опубликовано: (2010)
по: Montague, David A., 1967-
Опубликовано: (2010)
Cybercrime and cyberwarfare /
по: Bernik, Igor
Опубликовано: (2014)
по: Bernik, Igor
Опубликовано: (2014)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
по: Pearson, Robert L.
Опубликовано: (2007)
по: Pearson, Robert L.
Опубликовано: (2007)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
по: Calder, Alan, 1957-
Опубликовано: (2005)
по: Calder, Alan, 1957-
Опубликовано: (2005)
The misuse of information systems the impact of security countermeasures /
по: D'Arcy, John P., 1975-
Опубликовано: (2007)
по: D'Arcy, John P., 1975-
Опубликовано: (2007)
Dictionary of information security
по: Slade, Robert
Опубликовано: (2006)
по: Slade, Robert
Опубликовано: (2006)
Part-themed issue on internet security
Опубликовано: (2006)
Опубликовано: (2006)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
по: Li, Qing, и др.
Опубликовано: (2015)
по: Li, Qing, и др.
Опубликовано: (2015)
Managing information security
Опубликовано: (2010)
Опубликовано: (2010)
Innocent code a security wake-up call for Web programmers /
по: Huseby, Sverre H.
Опубликовано: (2004)
по: Huseby, Sverre H.
Опубликовано: (2004)
Computer security fundamentals /
по: Easttom, Chuck
Опубликовано: (2006)
по: Easttom, Chuck
Опубликовано: (2006)
Mastering network security
по: Brenton, Chris
Опубликовано: (2003)
по: Brenton, Chris
Опубликовано: (2003)
Privacy online : OECD guidance on policy and practice.
Опубликовано: (2003)
Опубликовано: (2003)
Electronic safety and soundness securing finance in a new age /
по: Glaessner, Thomas C.
Опубликовано: (2004)
по: Glaessner, Thomas C.
Опубликовано: (2004)
Схожие документы
-
Cyber security /
Опубликовано: (2014) -
Cyber security and resiliency policy framework /
Опубликовано: (2014) -
Advances in cyber security : technology, operations, and experiences /
Опубликовано: (2013) -
Cyber conflict competing national perspectives /
по: Ventre, Daniel
Опубликовано: (2012) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Опубликовано: (2001)