IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 101 - 110 of total 163 results.- 101OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): HAROLD.F TIPTON, STEVEN HERNANDEZ
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, INFORMATION SYSTEMS, COMPUTER SECURITY
Call No: 005.8 TIP
Accession No: 86623 - 102OFFICIAL (ISC)2 GUIDE TO THE CSSLP CBK
Author(s): MANO PAUL
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): COMPUTER SECURITY, COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT
Call No: 005.8 PAU
Accession No: 98947 - 103INFORMATION SECURITY POLICY DEVELOPMENT FOR COMPLIANCE: ISO/IEC 27001, NIST SP 800-53, HIPAA STANDARD, PCI DSS V2.0, AND AUP V5.0
Author(s): BARRY WILLIAMS
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 WIL
Accession No: 100840 - 104CYBERSECURITY: CURRENT WRITINGS ON THREATS AND PROTECTION
Author(s): ROGER L. KEMP, JOAQUIN JAY GONZALEZ
Publisher: MCFARLAND & COMPANY, INC., PUBLISHERS (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 GON
Accession No: 102630 - 105INFORMATION SECURITY POLICIES, PROCEDURES, AND STANDARDS: A PRACTITIONER'S REFERENCE
Author(s): DOUGLAS LANDOLL
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 LAN
Accession No: 94908 - 106OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): ADAM GORDON
Publisher: CRC PRESS (Publication Year:2015)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY
Call No: 005.8 GOR
Accession No: 91491 - 107THE SECOND ECONOMY: THE RACE FOR TRUST, TREASURE AND TIME IN THE CYBERSECURITY WAR
Author(s): STEVE GROBMAN, ALLISON CERRA
Publisher: APRESS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, INTERNET - SECURITY MEASURES
Call No: 005.8 GRO
Accession No: 95724 - 108CYBER SECURITY ON AZURE: AN IT PROFESSIONAL'S GUIDE TO MICROSOFT AZURE SECURITY CENTER
Author(s): MARSHALL COPELAND
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 COP
Accession No: 96554 - 109ENTERPRISE CYBERSECURITY STUDY GUIDE: HOW TO BUILD A SUCCESSFUL CYBERDEFENSE PROGRAM AGAINST ADVANCED THREATS
Author(s): SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, ABDUL ASLAM
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, PREVENTION
Call No: 005.8 DON
Accession No: 101462 - 110CYBERSECURITY INCIDENT RESPONSE: HOW TO CONTAIN, ERADICATE, AND RECOVER FROM INCIDENTS
Author(s): ERIC C. THOMPSON
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 THO
Accession No: 99286