Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Electronic data processing departments - Security measures"'
Refine your search
Availability
Limit to records with available items
Authors
Avoine, Gildas
Bosworth, Seymour
Carroll, John M
Erbschloe, Michael
Gritzalis, Dimitris
Junod, Pascal
Kabay, M. E
Katsikas, Sokratis K
Kaufman, Charlie
Lacey, David
Oechslin, Philippe
Panko, R. R
Perlman, Radia
Qureshi, Anique A
Schweitzer, James A
Shim, Jae K
Snedaker, Susan
Speciner, Michael
Turn, Rein
Whyne, Eric
Show more
Show less
Item types
English Books
Topics
Business - Data proc...
Business intelligenc...
Computer crimes
Computer crimes - Pr...
Computer networks - ...
Computer science
Computer security
Computer security - ...
Computers - Access c...
Crisis management
Data protection
Electronic data proc...
Electronic data proc...
Industries - Securit...
Information resource...
Information technolo...
Management - Employe...
Management informati...
Management informati...
Trade secrets
Show more
Show less
Your search returned 13 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managing the human factor in information security : how to win over staff and influence business managers
David Lacey
by
Lacey, David
Publication details:
Hoboken, NJ
Wiley
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 LAC
.
2.
Network security : private communication in a public world
Charlie Kaufman, Radia Perlman, Mike Speciner
by
Kaufman, Charlie
Perlman, Radia
Speciner, Michael
Edition:
2nd ed
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAU
.
3.
Physical security for IT
Michael Erbschloe
by
Erbschloe, Michael
Publication details:
Amsterdam ; Boston, MA
Elsevier Digital Press
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ERB
.
4.
Protecting business information : a manager's guide
James A. Schweitzer
by
Schweitzer, James A
Publication details:
Boston, MA
Butterworth-Heinemann
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 SCH
.
5.
The international handbook of computer Security
Joel G. Siegel, Jae K. Shim, Anique A. Qureshi
by
Shim, Jae K
Qureshi, Anique A
Shim, Jae K
Publication details:
Hoboken, N.J
Wiley
c1995
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SHI
.
6.
Business continuity & disaster recovery for IT professionals
Susan Snedaker
by
Snedaker, Susan
Publication details:
Burlington, MA
Syngress
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 SNE
.
7.
Computer system security: basic concepts and solved exercises
Gildas Avoine, Pascal Junod, Philippe Oechslin
by
Turn, Rein
Avoine, Gildas
Junod, Pascal
Oechslin, Philippe
Publication details:
Dedham, Mass
Artech House
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AVO
.
8.
Corporate computer and network security
Raymond R. Panko
by
Panko, R. R
Publication details:
Upper Saddle River, NJ
Pearson Prentice Hall
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PAN
.
9.
Information systems security
Sokratis K. Katsikas, Dimitris Gritzalis
by
Katsikas, Sokratis K
Gritzalis, Dimitris
Publication details:
London
Chapman & Hall
c1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAT
.
10.
No cover image available
Information systems security: security management, metrics, frameworks and best practices
by
Information Systems Security Association
Publication details:
Boston, MA
Auerbach Publications
c1992-c2007
Availability:
No items available.
11.
Computer security
John M. Carroll
by
Carroll, John M
Edition:
3rd ed
Publication details:
Oxford
Butterworth-Heinemann
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 CAR
.
12.
Computer security handbook
Seymour Bosworth, M. E. Kabay and Eric Whyne
by
Bosworth, Seymour
Kabay, M. E
Whyne, Eric
Edition:
5th ed
Publication details:
Hoboken, NJ
John Wiley & Sons
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 BOS.1
.
13.
Computer security handbook
Seymour Bosworth, M. E. Kabay and Eric Whyne
by
Bosworth, Seymour
Kabay, M. E
Whyne, Eric
Edition:
5th ed
Publication details:
Hoboken, NJ
John Wiley & Sons
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 BOS.2
.
Pages
Find us on the map
Powered by
Koha