IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 101 - 110 of total 158 results.- 101INFORMATION SECURITY POLICIES, PROCEDURES, AND STANDARDS: A PRACTITIONER'S REFERENCE
Author(s): DOUGLAS LANDOLL
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 LAN
Accession No: 94908 - 102OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): ADAM GORDON
Publisher: CRC PRESS (Publication Year:2015)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY
Call No: 005.8 GOR
Accession No: 91491 - 103THE SECOND ECONOMY: THE RACE FOR TRUST, TREASURE AND TIME IN THE CYBERSECURITY WAR
Author(s): STEVE GROBMAN, ALLISON CERRA
Publisher: APRESS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, INTERNET - SECURITY MEASURES
Call No: 005.8 GRO
Accession No: 95724 - 104CYBER SECURITY ON AZURE: AN IT PROFESSIONAL'S GUIDE TO MICROSOFT AZURE SECURITY CENTER
Author(s): MARSHALL COPELAND
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 COP
Accession No: 96554 - 105ENTERPRISE CYBERSECURITY STUDY GUIDE: HOW TO BUILD A SUCCESSFUL CYBERDEFENSE PROGRAM AGAINST ADVANCED THREATS
Author(s): SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, ABDUL ASLAM
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, PREVENTION
Call No: 005.8 DON
Accession No: 101462 - 106CYBERSECURITY INCIDENT RESPONSE: HOW TO CONTAIN, ERADICATE, AND RECOVER FROM INCIDENTS
Author(s): ERIC C. THOMPSON
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 THO
Accession No: 99286 - 107FINANCIAL CYBERSECURITY RISK MANAGEMENT: LEADERSHIP PERSPECTIVES AND GUIDANCE FOR SYSTEMS AND INSTITUTIONS
Author(s): J.L. BAYUK, PAUL ROHMEYER
Publisher: APRESS (Publication Year:2019)
Subject(s): RISK MANAGEMENT, COMPUTER SECURITY MANAGEMENT, CYBER INTELLIGENCE
Call No: 005.8 ROH
Accession No: 100608 - 108SYSTEM ADMINISTRATION ETHICS: TEN COMMANDMENTS FOR SECURITY AND COMPLIANCE IN A MODERN CYBER WORLD
Author(s): IGOR LJUBUNCIC, TOM LITTERER
Publisher: APRESS (Publication Year:2019)
Subject(s): COMPUTER NETWORKS, INFORMATION TECHNOLOGY, COMPUTER SECURITY, MORAL AND ETHICAL ASPECTS
Call No: 005.8 LJU
Accession No: 101560 - 109CYBER THREAT INTELLIGENCE: THE NO-NONSENSE GUIDE FOR CISOS AND SECURITY MANAGERS
Author(s): AARON ROBERTS
Publisher: APRESS (Publication Year:2021)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 ROB
Accession No: 104173 - 110BUILDING SECURE AND RELIABLE SYSTEMS: BEST PRACTICES FOR DESIGNING, IMPLEMENTING, AND MAINTAINING SYSTEMS
Author(s): BETSY BEYER, PIOTR LEWANDOWSKI, HEATHER ADKINS, PAUL BLANKINSHIP, OPREA STUBBLEFIELD
Publisher: O'REILLY MEDIA (Publication Year:2020)
Subject(s): INFORMATION SCIENCE, INFORMATION TECHNOLOGY, DATA PROTECTION, COMPUTER NETWORKS SECURITY MEASURES, SOFTWARE ENGINEERING, INFORMATION STORAGE AND RETRIEVAL SYSTEMS
Call No: 005.8 ADK
Accession No: 103391