Your search returned 13 results.

Sort
Results
1.
Managing the human factor in information security : how to win over staff and influence business managers David Lacey by
Publication details: Hoboken, NJ Wiley 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 LAC.

2.
Network security : private communication in a public world Charlie Kaufman, Radia Perlman, Mike Speciner by
Edition: 2nd ed
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAU.

3.
Physical security for IT Michael Erbschloe by
Publication details: Amsterdam ; Boston, MA Elsevier Digital Press c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ERB.

4.
Protecting business information : a manager's guide James A. Schweitzer by
Publication details: Boston, MA Butterworth-Heinemann 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 SCH.

5.
The international handbook of computer Security Joel G. Siegel, Jae K. Shim, Anique A. Qureshi by
Publication details: Hoboken, N.J Wiley c1995
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHI.

6.
Business continuity & disaster recovery for IT professionals Susan Snedaker by
Publication details: Burlington, MA Syngress 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 SNE.

7.
Computer system security: basic concepts and solved exercises Gildas Avoine, Pascal Junod, Philippe Oechslin by
Publication details: Dedham, Mass Artech House c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AVO.

8.
Corporate computer and network security Raymond R. Panko by
Publication details: Upper Saddle River, NJ Pearson Prentice Hall
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PAN.

9.
Information systems security Sokratis K. Katsikas, Dimitris Gritzalis by
Publication details: London Chapman & Hall c1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAT.

10.
Information systems security: security management, metrics, frameworks and best practices by
Publication details: Boston, MA Auerbach Publications c1992-c2007
Availability: No items available.

11.
Computer security John M. Carroll by
Edition: 3rd ed
Publication details: Oxford Butterworth-Heinemann 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 CAR.

12.
Computer security handbook Seymour Bosworth, M. E. Kabay and Eric Whyne by
Edition: 5th ed
Publication details: Hoboken, NJ John Wiley & Sons 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 BOS.1.

13.
Computer security handbook Seymour Bosworth, M. E. Kabay and Eric Whyne by
Edition: 5th ed
Publication details: Hoboken, NJ John Wiley & Sons 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 BOS.2.

Pages

Find us on the map

Powered by Koha