Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
54 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for INFORMATION SECURITY MANAGEMENT SYSTEMS : A Novel Framework and Software as a Tool for Compliance with Information Security Standards
4. 
Cover image for Business continuity and disaster recovery planning for IT professionals
8. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
10. 
Cover image for Multimedia information hiding technologies and methodologies for controlling data
11. 
Cover image for Management of information security
12. 
Cover image for Threats, countermeasures, and advances in applied information security
14. 
Cover image for The art of enterprise information architecture : a systems-based approach for unlocking business insight
15. 
Cover image for Managing the human factor in information security : how to win over staff and influence business managers
17. 
Cover image for Information assurance architecture
18. 
Cover image for CISA : certified information systems auditor : study guide
19. 
Cover image for MANAGEMENT OF INFORMATION SECURITY
20. 
Cover image for Risk, complexity and ICT
21. 
Cover image for IT risk : turning business threats into competitive advantage
22. 
Cover image for Implementing the ISO/IEC 27001 information security management system standard
23. 
Cover image for Strategic security management : a risk assessment guide for decision makers
24. 
Cover image for Secure data management in decentralized systems
27. 
Cover image for Enterprise information systems assurance and system security : managerial and technical issues
28. 
Cover image for CISA - Certified Information Systems Auditor : study guide
29. 
Cover image for Information security : a strategic approach
32. 
Cover image for CISA - Certified Information Systems Auditor study guide
33. 
Cover image for Managing information systems security and privacy
34. 
Cover image for Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
36. 
Cover image for Web based energy information and control systems : ase studies and applications
Go to:Search Results
|
Top of Page
|
Search Facets