Suggested Topics within your search.
Suggested Topics within your search.
- Security measures
- Computer networks 65
- Computer security 49
- Information technology 25
- Prevention 19
- Information warfare 17
- Data protection 16
- Cyberterrorism 13
- Cyberspace 11
- Management 11
- Internet 8
- Access control 7
- Computer crimes 7
- Business enterprises 6
- Electronic data processing departments 6
- Planning 5
- Radio frequency identification systems 5
- Safety measures 5
- COMPUTERS / Security / General 4
- Cloud computing 4
- Computers 4
- Data encryption (Computer science) 4
- Emergency management 4
- Industries 4
- Management information systems 4
- Terrorism 4
- Auditing 3
- COMPUTERS / Internet / Security 3
- Cryptography 3
- Electronic data processing 3
-
1
-
2
Freedom and information assessing publicly available data regarding U.S. transportation infrastructure security /
Published 2006Table of Contents: “…Introduction -- Defining terrorists' information requirements : the ModIPB framework -- Summary of red team findings and validation -- Conclusions and recommendations.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Information warfare
Published 2009Table of Contents: “…The United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Information warfare /
Published 2016Subjects: “…Information warfare.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
-
7
Information technology for counterterrorism immediate actions and future possibilities /
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Outsourcing information security
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Dictionary of information security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Online information review.
Published 2007“…Online information review ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
-
12
Managing information security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
Published 2014Subjects:Book -
14
-
15
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
16
Information security and optimization /
Published 2021Table of Contents: “…Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. …”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
17
Total information risk management : maximizing the value of data and information assets /
Published 2014Table of Contents: “…Information risk : a management challenge in the 21st century -- The total information risk management (TIRM) process -- Application examples in the industry -- Additional risk management techniques that can be used within the TIRM process -- Software tools -- A pathway to a better managed future.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Governance and internal controls for cutting edge IT /
Published 2013Subjects: “…Business enterprises Information technology Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Security and control in information systems a guide for business and accounting /
Published 2000Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20