Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Computer security
- Security measures 34
- Information technology 7
- Data protection 6
- Prevention 5
- Access control 4
- Certification 4
- Examinations 4
- Management 4
- Business enterprises 3
- COMPUTERS / Security / General 3
- Cyberterrorism 3
- Electronic data processing personnel 3
- Auditing 2
- Cloud computing 2
- Computers 2
- Data encryption (Computer science) 2
- Electronic data processing departments 2
- Electronic information resources 2
- Information visualization 2
- BUSINESS & ECONOMICS / Development / Business Development 1
- BUSINESS & ECONOMICS / Management 1
- BUSINESS & ECONOMICS / Management Science 1
- Browsers (Computer programs) 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Information Technology 1
- Computer crimes 1
- Computer hackers 1
-
1
-
2
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Information technology for counterterrorism immediate actions and future possibilities /
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
-
5
Managing information security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
Published 2014Subjects:Book -
7
-
8
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
9
-
10
Enterprise information security and privacy
Published 2009Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Computer and information security handbook
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Security architect : careers in information security /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
How to cheat at managing information security
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
-
15
The basics of IT audit : purposes, processes, and practical information /
Published 2014Subjects: “…Information technology Auditing.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Data visualization.
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
-
18
Security data visualization graphical techniques for network analysis /
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
-
20