Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Information technology - Security measures"'
Refine your search
Availability
Limit to records with available items
Authors
Brotby, W. Krag
Calder, Alan
Foreman, Park
Gentile, Michael
Gentile, Skye
Hayden, Lance
Herrmann, Francine
Hill, David G
Hunter, Richard
Khadraoui, Djamel
Knapp, Kenneth J
Kouns, Jake
Lacey, David
Loeb, Martin P
Loendorf, Todd
Mattord, Herbert J
Nemati, Hamid R
Pipkin, Donald L
Shostack, Adam
Westerman, George
Show more
Show less
Item types
Books
English Books
Topics
Business - Data proc...
Business enterprises...
Computer crimes - Pr...
Computer networks - ...
Computer science
Computer security
Computer security - ...
Computer security - ...
Computer security eq...
Cyberspace - Securit...
Data protection
Data protection - Ev...
Emergency management
Industries - Securit...
Information technolo...
Information technolo...
Information technolo...
Management informati...
Risk management
Trade secrets
Show more
Show less
Your search returned 19 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managing cybersecurity resources : a cost-benefit analysis
by Lawrence A. Gordon and Martin P. Loeb
by
Gordon, Lawrence A
Loeb, Martin P
Publication details:
New York
McGraw-Hill
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GOR
.
2.
Managing the human factor in information security : how to win over staff and influence business managers
David Lacey
by
Lacey, David
Publication details:
Hoboken, NJ
Wiley
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 LAC
.
3.
Patriotic information systems
Todd Loendorf & G. David Garson, editors
by
Garson, G. David
Loendorf, Todd
Publication details:
Hershey
IGI Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 LOE
.
4.
Principles of incident response and disaster recovery
Michael E. Whitman, Herbert J. Mattord
by
Whitman, Michael E
Mattord, Herbert J
Publication details:
Boston, MA
Thomson Course Technology
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WHI
.
5.
The new school of information security
Adam Shostack and Andrew Stewart
by
Shostack, Adam
Stewart, Andrew
Publication details:
Upper Saddle River, NJ
Addison-Wesley
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 SHO
.
6.
Vulnerability management
Park Foreman
by
Foreman, Park
Publication details:
Boca Raton, FL
Auerbach Publications
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 FOR
.
7.
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
Ron Collette, Mike Gentile, Skye Gentile
by
Collette, Ronald D
Gentile, Michael
Gentile, Skye
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 COL
.
8.
Cyber-security and global information assurance : threat analysis and response solutions
Kenneth J. Knapp, editor
by
Knapp, Kenneth J
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KNA
.
9.
Data protection : governance, risk management, and compliance
David G. Hill
by
Hill, David G
Publication details:
Baca Raton, FL
Taylor & Francis
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.86 HIL
.
10.
Information security : protecting the global enterprise
Donald L. Pipkin
by
Pipkin, Donald L
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PIP
.
11.
Information security management metrics : a definitive guide to effective security monitoring and measurement
W. Krag Brotby
by
Brotby, W. Krag
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 BRO
.
12.
Information Technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Jake Kouns, Daniel Minoli
by
Kouns, Jake
Minoli, Daniel
Publication details:
Hoboken, NJ
Wiley
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 KOU
.
13.
Information warfare
Daniel Ventre
by
Ventre, Daniel
Publication details:
London, UK ; Hoboken, NJ
ISTE Ltd. ; John Wiley & Sons
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
355.343 VEN
.
14.
IT risk : turning business threats into competitive advantage
George Westerman, Richard Hunter
by
Westerman, George
Hunter, Richard
Publication details:
Boston, MA
Harvard Business School
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 WES
.
15.
IT security metrics : a practical framework for measuring security & protecting data
Lance Hayden
by
Hayden, Lance
Publication details:
New York
McGraw Hill
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAY
.
16.
Information security and ethics : concepts, methodologies, tools and applications
Hamid Nemati, [editor]
by
Nemati, Hamid R
Publication details:
Hershey, PA
Information Science Reference
c2008
Availability:
Items available for loan:
Anna Centenary Library
(6)
Call number:
005.8 NEM, ..
.
17.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law
Alan Calder
by
Calder, Alan
Publication details:
London
Kogan Page
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
18.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law
Alan Calder
by
Calder, Alan
Publication details:
London
Kogan Page
c2005
Availability:
No items available.
19.
Advances in enterprise information technology security
Djamel Khadraoui and Francine Herrmann, editors
by
Herrmann, Francine
Khadraoui, Djamel
Publication details:
Hershey, PA
Information Science Reference
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KHA
.
Pages
Find us on the map
Powered by
Koha