Showing 1 - 20 results of 112 for search '"information"', query time: 0.05s Refine Results
  1. 1
  2. 2

    Information getting, protecting and using data.

    Published 2003
    Subjects: “…Information technology.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3
  4. 4

    Information security policy, processes, and practices /

    Published 2008
    “…Advances in management information systems.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    Information warfare by Ventre, Daniel

    Published 2009
    Table of Contents: “…The United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Information warfare / by Ventre, Daniel

    Published 2016
    Subjects: “…Information warfare.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8

    Information privacy fundamentals for librarians and information professionals / by Givens, Cherie L., 1969-

    Published 2015
    Table of Contents: “…Introduction to information privacy -- Protecting information privacy : a professional imperative -- Major U.S. privacy protections : laws, regulators, and approaches to enforcement -- Privacy literacy -- Information privacy in libraries -- Privacy policies and programs -- Global information privacy.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9

    Information assurance for the entrerprise : a roadmap to information security / by Schou, Corey

    Published 2007
    “…a roadmap to information security…”
    Book
  10. 10

    Information assurance for the enterprise : a roadmap to information security / by Schou, Corey

    Published 2007
    Book
  11. 11
  12. 12
  13. 13

    Dictionary of information security by Slade, Robert

    Published 2006
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14
  15. 15

    Information security for management by Iyengar, Venugopal

    Published 2010
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16
  17. 17

    Managing information security

    Published 2010
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18

    The basics of information security : understanding the fundamentals of InfoSec in theory and practice / by Andress, Jason

    Published 2014
    Subjects:
    Book
  19. 19

    Principles of information security / by Whitman, Michael E., 1964-

    Published 2016
    Book
  20. 20

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book