Information technology - Security measures.
Overview
Works: | 42 works in 23 publications in 23 languages |
---|
Titles
The executive guide to information security :threats, challenges, and solutions /
by:
(Language materials, printed)
Information security and ethicsconcepts, methodologies, tools and applications /
by:
(Electronic resources)
Information security and employee behaviourhow to reduce risk through employee education, training and awareness /
by:
(Electronic resources)
Information securitya manager's guide to thwarting data thieves and hackers /
by:
(Electronic resources)
Critical infrastructure protectioninformation infrastructure models, analysis, and defense /
by:
(Electronic resources)
Information security management metricsa definitive guide to effective security monitoring and measurement /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurancenew technologies /
by:
(Electronic resources)
Information security governancea practical development and implementation approach /
by:
(Electronic resources)
Security de-engineeringsolving the problems in information risk management /
by:
(Electronic resources)
Total information risk managementmaximizing the value of data and information assets /
by:
(Electronic resources)
Architectures and protocols for secure information technology infrastructures /
by:
(Electronic resources)
Collaboration with cloud computingsecurity, social media, and unified communications /
by:
(Electronic resources)
Privacy in a digital, networked worldtechnologies, implications and solutions /
by:
(Electronic resources)
IT security risk management in the context of cloud computingtowards an understanding of the key role of providers' IT security risk perceptions /
by:
(Electronic resources)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
Information security sciencemeasuring the vulnerability to data compromises /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations /
by:
(Language materials, printed)
The Huawei and Snowden questionsCan electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations
by:
(Electronic resources)
The cloud security ecosystemtechnical, legal, business and management issues /
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Data stewardshipan actionable guide to effective data management and data governance /
by:
(Electronic resources)
Show more
Fewer
Subjects