Information security a manager's guide to thwarting data thieves and hackers /
Saved in:
Main Author: | Alexander, Philip, 1963- |
---|---|
Corporate Author: | ebrary, Inc |
Format: | Electronic eBook |
Language: | English |
Published: |
Westport, Conn. :
Praeger Security International,
2008.
|
Series: | PSI business security.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Enterprise information security and privacy
Published: (2009)
Published: (2009)
Control and security of E-commerce
by: Smith, Gordon E. (Gordon Edward)
Published: (2004)
by: Smith, Gordon E. (Gordon Edward)
Published: (2004)
Security and control in information systems a guide for business and accounting /
by: Hawker, Andrew
Published: (2000)
by: Hawker, Andrew
Published: (2000)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
by: McIlwraith, Angus
Published: (2006)
by: McIlwraith, Angus
Published: (2006)
Business continuity and disaster recovery planning for IT professionals /
by: Snedaker, Susan
Published: (2014)
by: Snedaker, Susan
Published: (2014)
Integrated identity management using IBM Tivoli security solutions
by: Bücker, Axel
Published: (2004)
by: Bücker, Axel
Published: (2004)
Aspects of network and information security
Published: (2008)
Published: (2008)
Managing the human factor in information security how to win over staff and influence business managers /
by: Lacey, David
Published: (2009)
by: Lacey, David
Published: (2009)
Lotus security handbook
Published: (2004)
Published: (2004)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
by: Canavan, Tom
Published: (2011)
by: Canavan, Tom
Published: (2011)
Identity management concepts, technologies, and systems /
by: Bertino, Elisa
Published: (2011)
by: Bertino, Elisa
Published: (2011)
Privacy online : OECD guidance on policy and practice.
Published: (2003)
Published: (2003)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
by: Mehan, Julie E.
Published: (2009)
by: Mehan, Julie E.
Published: (2009)
Advances in artificial intelligence for privacy protection and security
Published: (2010)
Published: (2010)
Cyber threat! : how to manage the growing risk of cyber attacks /
by: Ulsch, N. MacDonnell, 1951-
Published: (2014)
by: Ulsch, N. MacDonnell, 1951-
Published: (2014)
Information warfare
by: Ventre, Daniel
Published: (2009)
by: Ventre, Daniel
Published: (2009)
Security architect : careers in information security /
by: Collins, Jon
Published: (2014)
by: Collins, Jon
Published: (2014)
Computer and information security handbook
Published: (2009)
Published: (2009)
Managing information security
Published: (2010)
Published: (2010)
The insider threat combatting the enemy within /
by: Blackwell, Clive
Published: (2009)
by: Blackwell, Clive
Published: (2009)
Business continuity planning for data centers and systems a strategic implementation guide /
by: Bowman, Ronald H., 1960-
Published: (2008)
by: Bowman, Ronald H., 1960-
Published: (2008)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Information security governance simplified from the boardroom to the keyboard /
by: Fitzgerald, Todd
Published: (2012)
by: Fitzgerald, Todd
Published: (2012)
Information warfare /
by: Ventre, Daniel
Published: (2016)
by: Ventre, Daniel
Published: (2016)
Securing information and communications systems principles, technologies, and applications /
Published: (2008)
Published: (2008)
Web commerce security design and development /
by: Nahari, Hadi
Published: (2011)
by: Nahari, Hadi
Published: (2011)
Network attacks & exploitation : a framework /
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Security risk management building an information security risk management program from the ground up /
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
Information security for management
by: Iyengar, Venugopal
Published: (2010)
by: Iyengar, Venugopal
Published: (2010)
How to cheat at managing information security
by: Osborne, Mark
Published: (2006)
by: Osborne, Mark
Published: (2006)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published: (2015)
Published: (2015)
Dictionary of information security
by: Slade, Robert
Published: (2006)
by: Slade, Robert
Published: (2006)
Developer's guide to web application security
by: Cross, Michael
Published: (2007)
by: Cross, Michael
Published: (2007)
Cyber security /
Published: (2014)
Published: (2014)
The basics of IT audit : purposes, processes, and practical information /
by: Gantz, Stephen D.
Published: (2014)
by: Gantz, Stephen D.
Published: (2014)
Security convergence managing enterprise security risk /
by: Tyson, Dave
Published: (2007)
by: Tyson, Dave
Published: (2007)
Internet security and firewalls
by: Preetham, V. V.
Published: (2002)
by: Preetham, V. V.
Published: (2002)
The misuse of information systems the impact of security countermeasures /
by: D'Arcy, John P., 1975-
Published: (2007)
by: D'Arcy, John P., 1975-
Published: (2007)
Network security /
by: Perez, Andre
Published: (2014)
by: Perez, Andre
Published: (2014)
Similar Items
-
Enterprise information security and privacy
Published: (2009) -
Control and security of E-commerce
by: Smith, Gordon E. (Gordon Edward)
Published: (2004) -
Security and control in information systems a guide for business and accounting /
by: Hawker, Andrew
Published: (2000) -
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
by: McIlwraith, Angus
Published: (2006) -
Business continuity and disaster recovery planning for IT professionals /
by: Snedaker, Susan
Published: (2014)