Safeguarding critical e-documents implementing a program for securing confidential information assets /
"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an unde...
Furkejuvvon:
Váldodahkki: | Smallwood, Robert F., 1959- |
---|---|
Searvvušdahkki: | ebrary, Inc |
Materiálatiipa: | Elektrovnnalaš E-girji |
Giella: | eaŋgalasgiella |
Almmustuhtton: |
Hoboken, New Jersey :
Wiley,
2012.
|
Fáttát: | |
Liŋkkat: | An electronic book accessible through the World Wide Web; click to view |
Fáddágilkorat: |
Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Geahča maid
Cyber security /
Almmustuhtton: (2014)
Almmustuhtton: (2014)
Cyber security and resiliency policy framework /
Almmustuhtton: (2014)
Almmustuhtton: (2014)
Advances in cyber security : technology, operations, and experiences /
Almmustuhtton: (2013)
Almmustuhtton: (2013)
Cyber conflict competing national perspectives /
Dahkki: Ventre, Daniel
Almmustuhtton: (2012)
Dahkki: Ventre, Daniel
Almmustuhtton: (2012)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Almmustuhtton: (2001)
Almmustuhtton: (2001)
Cyber blockades /
Dahkki: Russell, Alison Lawlor
Almmustuhtton: (2014)
Dahkki: Russell, Alison Lawlor
Almmustuhtton: (2014)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
Dahkki: Woody, Aaron
Almmustuhtton: (2013)
Dahkki: Woody, Aaron
Almmustuhtton: (2013)
Implementing email security and tokens current standards, tools, and practices /
Dahkki: Turner, Sean
Almmustuhtton: (2008)
Dahkki: Turner, Sean
Almmustuhtton: (2008)
Security architect : careers in information security /
Dahkki: Collins, Jon
Almmustuhtton: (2014)
Dahkki: Collins, Jon
Almmustuhtton: (2014)
How to measure anything in cybersecurity risk /
Dahkki: Hubbard, Douglas W., 1962-, et al.
Almmustuhtton: (2016)
Dahkki: Hubbard, Douglas W., 1962-, et al.
Almmustuhtton: (2016)
Wars of disruption and resilience cybered conflict, power, and national security /
Dahkki: Demchak, Chris C.
Almmustuhtton: (2011)
Dahkki: Demchak, Chris C.
Almmustuhtton: (2011)
The secure online business handbook a practical guide to risk management and business continuity /
Almmustuhtton: (2006)
Almmustuhtton: (2006)
Implementing database security and auditing
Dahkki: Ben-Natan, Ron
Almmustuhtton: (2005)
Dahkki: Ben-Natan, Ron
Almmustuhtton: (2005)
Android security internals : an in-depth guide to android's security architecture /
Dahkki: Elenkov, Nikolay
Almmustuhtton: (2015)
Dahkki: Elenkov, Nikolay
Almmustuhtton: (2015)
Hack proofing ColdFusion
Dahkki: Meyer, Greg
Almmustuhtton: (2002)
Dahkki: Meyer, Greg
Almmustuhtton: (2002)
Control and security of E-commerce
Dahkki: Smith, Gordon E. (Gordon Edward)
Almmustuhtton: (2004)
Dahkki: Smith, Gordon E. (Gordon Edward)
Almmustuhtton: (2004)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
Dahkki: Bradley, Tony
Almmustuhtton: (2006)
Dahkki: Bradley, Tony
Almmustuhtton: (2006)
Android security cookbook /
Dahkki: Makan, Keith
Almmustuhtton: (2013)
Dahkki: Makan, Keith
Almmustuhtton: (2013)
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks /
Dahkki: Kumar, Atul
Almmustuhtton: (2011)
Dahkki: Kumar, Atul
Almmustuhtton: (2011)
Web commerce security design and development /
Dahkki: Nahari, Hadi
Almmustuhtton: (2011)
Dahkki: Nahari, Hadi
Almmustuhtton: (2011)
Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 /
Almmustuhtton: (2001)
Almmustuhtton: (2001)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
Dahkki: Mularien, Peter
Almmustuhtton: (2010)
Dahkki: Mularien, Peter
Almmustuhtton: (2010)
Check Point NG next generation security administration /
Almmustuhtton: (2002)
Almmustuhtton: (2002)
Distributed systems security issues, processes, and solutions /
Almmustuhtton: (2009)
Almmustuhtton: (2009)
How to cheat at designing security for a Windows Server 2003 network
Dahkki: Amini, Rob
Almmustuhtton: (2006)
Dahkki: Amini, Rob
Almmustuhtton: (2006)
Cyber security engineering : a practical approach for systems and software assurance /
Dahkki: Mead, Nancy R.
Almmustuhtton: (2016)
Dahkki: Mead, Nancy R.
Almmustuhtton: (2016)
Essentials of online payment security and fraud prevention
Dahkki: Montague, David A., 1967-
Almmustuhtton: (2010)
Dahkki: Montague, David A., 1967-
Almmustuhtton: (2010)
Cybercrime and cyberwarfare /
Dahkki: Bernik, Igor
Almmustuhtton: (2014)
Dahkki: Bernik, Igor
Almmustuhtton: (2014)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
Dahkki: Pearson, Robert L.
Almmustuhtton: (2007)
Dahkki: Pearson, Robert L.
Almmustuhtton: (2007)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
Dahkki: Calder, Alan, 1957-
Almmustuhtton: (2005)
Dahkki: Calder, Alan, 1957-
Almmustuhtton: (2005)
The misuse of information systems the impact of security countermeasures /
Dahkki: D'Arcy, John P., 1975-
Almmustuhtton: (2007)
Dahkki: D'Arcy, John P., 1975-
Almmustuhtton: (2007)
Dictionary of information security
Dahkki: Slade, Robert
Almmustuhtton: (2006)
Dahkki: Slade, Robert
Almmustuhtton: (2006)
Part-themed issue on internet security
Almmustuhtton: (2006)
Almmustuhtton: (2006)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Dahkki: Li, Qing, et al.
Almmustuhtton: (2015)
Dahkki: Li, Qing, et al.
Almmustuhtton: (2015)
Managing information security
Almmustuhtton: (2010)
Almmustuhtton: (2010)
Innocent code a security wake-up call for Web programmers /
Dahkki: Huseby, Sverre H.
Almmustuhtton: (2004)
Dahkki: Huseby, Sverre H.
Almmustuhtton: (2004)
Computer security fundamentals /
Dahkki: Easttom, Chuck
Almmustuhtton: (2006)
Dahkki: Easttom, Chuck
Almmustuhtton: (2006)
Mastering network security
Dahkki: Brenton, Chris
Almmustuhtton: (2003)
Dahkki: Brenton, Chris
Almmustuhtton: (2003)
Privacy online : OECD guidance on policy and practice.
Almmustuhtton: (2003)
Almmustuhtton: (2003)
Electronic safety and soundness securing finance in a new age /
Dahkki: Glaessner, Thomas C.
Almmustuhtton: (2004)
Dahkki: Glaessner, Thomas C.
Almmustuhtton: (2004)
Geahča maid
-
Cyber security /
Almmustuhtton: (2014) -
Cyber security and resiliency policy framework /
Almmustuhtton: (2014) -
Advances in cyber security : technology, operations, and experiences /
Almmustuhtton: (2013) -
Cyber conflict competing national perspectives /
Dahkki: Ventre, Daniel
Almmustuhtton: (2012) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Almmustuhtton: (2001)