Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Computer security - Management"'
Refine your search
Availability
Limit to records with available items
Authors
Alberts, Christopher
Bailey, Bliss N
Bazavan, Ioana V
Carr, Houston H
Fitzgerald, Todd
Gupta, Manish
Harley, David
Knapp, Kenneth J
Krause, Micki
Lim, Ian
Mattord, Herbert J
Nestler, Vincent J
Nicastro, Felicia M
Peltier, Justin
Raggad, Bel G
Snyder, Charles A
Taylor, Andy
Tipton, Harold F
Vacca, John R
Willett, Keith D
Show more
Show less
Item types
Books
English Books
Topics
British Computer Soc...
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer science
Computer security - ...
Computer security - ...
Computer security - ...
Computer security - ...
Computer security --...
Computer viruses
COMPUTERS -- Interne...
Cyberspace - Securit...
Data protection
Data protection - Ha...
Electronic data proc...
Emergency management
Information technolo...
Software maintenance
Trade secrets
Show more
Show less
Your search returned 20 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managing information security
editor John R. Vacca
by
Vacca, John R
Publication details:
Amsterdam
Elsevier
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 VAC
.
2.
Managing information security risks : the OCTAVE approach
Christopher Alberts and Audret Dorofee
by
Alberts, Christopher
Dorofee, Audret
Publication details:
New Jersey
Pearson Education
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 ALB
.
3.
Principles of incident response and disaster recovery
Michael E. Whitman, Herbert J. Mattord
by
Whitman, Michael E
Mattord, Herbert J
Publication details:
Boston, MA
Thomson Course Technology
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WHI
.
4.
The management of network security : technology, design, and management control
Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey
by
Carr, Houston H
Bailey, Bliss N
Snyder, Charles A
Publication details:
Upper Saddle River, NJ
Prentice Hall
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAR
.
5.
CISO leadership : essential principles for success
edited by Todd Fitzgerald, Micki Krause
by
Fitzgerald, Todd
Krause, Micki
Publication details:
New York
Auerbach Publications
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 FIT
.
6.
Complete guide to CISM certification
Thomas R. Peltier, Justin Peltier
by
Peltier, Thomas R
Peltier, Justin
Publication details:
Boca Raton, FL
Auerbach Publications
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8068 PEL
.
7.
No cover image available
Computer security lab manual
Vincent J. Nestler ... [et al.]
by
Nestler, Vincent J
Publication details:
Boston ; McGraw-Hill Irwin, c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NES
.
8.
Curing the patch management headache
Felicia M. Nicastro
by
Nicastro, Felicia M
Publication details:
Boca Raton, FL
Auerbach Publications
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NIC
.
9.
Cyber-security and global information assurance : threat analysis and response solutions
Kenneth J. Knapp, editor
by
Knapp, Kenneth J
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KNA
.
10.
Handbook of information security management
Micki Krause, Harold F. Tipton, editors
by
Krause, Micki
Tipton, Harold F
Publication details:
Boca Raton, FL
Auerbach
c1998
Availability:
No items available.
11.
Handbook of research on social and organizational liabilities in information security
[edited by] Manish Gupta, Raj Sharman
by
Gupta, Manish
Sharman, Raj
Publication details:
Hershey, PA
Information Science Reference
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GUP
.
12.
How to achieve 27001 certification : an example of applied compliance management
Sigurjon Thor Arnason, Keith D. Willett
by
Arnason, Sigurjon Thor
Willett, Keith D
Publication details:
New York
Auerbach Publications
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ARN
.
13.
Information security cost management
Ioana V. Bazavan, Ian Lim
by
Bazavan, Ioana V
Lim, Ian
Publication details:
Boca Raton
Auerbach
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8068 BAZ
.
14.
Information security management & small systems security : IFIP TC11 WG11.1/WG11.2 seventh annual working conference on information security management & small systems security, September 30-October 1, 1999, Amsterdam, the Netherlands
edited by Jan H.P. Eloff ... [et al.]
by
Eloff, Jan H. P
IFIP TC11 WG11.1/WG11.2 Working Conference on Information Security Management & Small Systems Security (7th : 1999 : Amsterdam, Netherlands)
Publication details:
Dordrecht ; Boston
Kluwer Academic
c1999
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.0558 ELO
.
15.
Information security management : concepts and practice
Bel G. Raggad
by
Raggad, Bel G
Publication details:
Boca Raton, FL
CRC Press/Taylor & Francis
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 RAG
.
16.
Information security management principles : an ISEB certificate
Andy Taylor ... [et al.]
by
Taylor, Andy
Edition:
1st ed
Publication details:
Swindon, UK
British Computer Society
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TAY
.
17.
Information warfare
Daniel Ventre
by
Ventre, Daniel
Publication details:
London, UK ; Hoboken, NJ
ISTE Ltd. ; John Wiley & Sons
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
355.343 VEN
.
18.
Information security management handbook
Harold F. Tipton, Micki Krause, [editors]
by
Krause, Micki
Tipton, Harold F
Edition:
6th ed
Publication details:
Boca Raton, FL
Auerbach Publications
c2007-2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TIP
.
19.
Information security management handbook
Harold F Tipton, Micki Krause
by
Tipton, Harold F
Krause, Micki
Edition:
6th ed
Publication details:
Boca Raton, FL
Auerbach Publications
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 TIP
.
20.
AVIEN malware defense guide for the enterprise
David Harley ... [et al.] ; foreword by Robert S. Vibert
by
Harley, David
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAR
.
Pages
Find us on the map
Powered by
Koha