Your search returned 19 results.

Sort
Results
1.
Managing cybersecurity resources : a cost-benefit analysis by Lawrence A. Gordon and Martin P. Loeb by
Publication details: New York McGraw-Hill c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GOR.

2.
Managing the human factor in information security : how to win over staff and influence business managers David Lacey by
Publication details: Hoboken, NJ Wiley 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 LAC.

3.
Patriotic information systems Todd Loendorf & G. David Garson, editors by
Publication details: Hershey IGI Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 LOE.

4.
Principles of incident response and disaster recovery Michael E. Whitman, Herbert J. Mattord by
Publication details: Boston, MA Thomson Course Technology c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WHI.

5.
The new school of information security Adam Shostack and Andrew Stewart by
Publication details: Upper Saddle River, NJ Addison-Wesley 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 SHO.

6.
Vulnerability management Park Foreman by
Publication details: Boca Raton, FL Auerbach Publications c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOR.

7.
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives Ron Collette, Mike Gentile, Skye Gentile by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 COL.

8.
Cyber-security and global information assurance : threat analysis and response solutions Kenneth J. Knapp, editor by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KNA.

9.
Data protection : governance, risk management, and compliance David G. Hill by
Publication details: Baca Raton, FL Taylor & Francis 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.86 HIL.

10.
Information security : protecting the global enterprise Donald L. Pipkin by
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PIP.

11.
Information security management metrics : a definitive guide to effective security monitoring and measurement W. Krag Brotby by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 BRO.

12.
Information Technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams Jake Kouns, Daniel Minoli by
Publication details: Hoboken, NJ Wiley 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 KOU.

13.
Information warfare Daniel Ventre by
Publication details: London, UK ; Hoboken, NJ ISTE Ltd. ; John Wiley & Sons c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 355.343 VEN.

14.
IT risk : turning business threats into competitive advantage George Westerman, Richard Hunter by
Publication details: Boston, MA Harvard Business School 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 WES.

15.
IT security metrics : a practical framework for measuring security & protecting data Lance Hayden by
Publication details: New York McGraw Hill c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAY.

16.
Information security and ethics : concepts, methodologies, tools and applications Hamid Nemati, [editor] by
Publication details: Hershey, PA Information Science Reference c2008
Availability: Items available for loan: Anna Centenary Library (6)Call number: 005.8 NEM, ...

17.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law Alan Calder by
Publication details: London Kogan Page c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

18.
19.
Advances in enterprise information technology security Djamel Khadraoui and Francine Herrmann, editors by
Publication details: Hershey, PA Information Science Reference c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KHA.

Pages

Find us on the map

Powered by Koha