Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 49
- Computer networks 38
- Data protection 26
- Information technology 18
- Management 13
- Access control 12
- Prevention 8
- COMPUTERS / Security / General 7
- Computers 7
- Data encryption (Computer science) 6
- Internet 6
- Computer crimes 5
- Computer software 5
- Electronic information resources 5
- Privacy, Right of 5
- Systems and Data Security 5
- Certification 4
- Computer Science 4
- Computer science 4
- Cyberterrorism 4
- Electronic data processing departments 4
- Examinations 4
- Information warfare 4
- Law and legislation 4
- Reliability 4
- Artificial intelligence 3
- Auditing 3
- Business enterprises 3
- COMPUTERS / Internet / Security 3
-
1
Information getting, protecting and using data.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Information getting, protecting and using data.
Published 2003Subjects: “…Information technology.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
-
4
Information security policy, processes, and practices /
Published 2008“…Advances in management information systems.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Information warfare
Published 2009Table of Contents: “…The United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Information warfare /
Published 2016Subjects: “…Information warfare.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Information privacy fundamentals for librarians and information professionals /
Published 2015Table of Contents: “…Introduction to information privacy -- Protecting information privacy : a professional imperative -- Major U.S. privacy protections : laws, regulators, and approaches to enforcement -- Privacy literacy -- Information privacy in libraries -- Privacy policies and programs -- Global information privacy.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Information assurance for the entrerprise : a roadmap to information security /
Published 2007“…a roadmap to information security…”
Book -
10
-
11
-
12
Information technology for counterterrorism immediate actions and future possibilities /
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Dictionary of information security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
-
15
Information security for management
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Assessing information security strategies, tactics, logic and framework /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Managing information security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
Published 2014Subjects:Book -
19
-
20
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book