Limit Search Results
Author
Language
Format
Subject
56 Results Found Subscribe to search results
00000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Data & computer security : dictionary of standards, concepts and terms
2. 
Cover image for Network security essentials applications and standards
3. 
Cover image for Security without obscurity : a guide to confidentiality, authentication, and integrity
4. 
Cover image for Security for service oriented architectures
7. 
Cover image for Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux
8. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
11. 
Cover image for PCI compliance :  understand and implement effective PCI data security standard compliance
12. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
19. 
Cover image for Network security essentials : applications and standards
20. 
Cover image for Governance of picture archiving and communications systems : data security and quality management of filmless radiology
21. 
Cover image for Implementing email and security tokens : current standards, tools, and practices
23. 
Cover image for IT compliance and controls : best practices for implementation
24. 
Cover image for Network security essentials : applications and standards
25. 
Cover image for Implementing the ISO/IEC 27001 information security management system standard
26. 
Cover image for PCI compliance : understand and implement effective PCI data security standard compliance
34. 
Cover image for User's guide to cryptography and standards
35. 
Cover image for Brute force : cracking the data encryption standard
37. 
Cover image for Using the common criteria for IT security evaluation
39. 
Cover image for Information security policies, procedures, and standards : guidelines for effective information security management
42. 
Cover image for Using SET for secure electronic commerce