Limit Search Results
Language
Format
24 Results Found Subscribe to search results
000000000000000000000000MAIN
Print
3. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
4. 
Cover image for Security without obscurity : a guide to confidentiality, authentication, and integrity
5. 
Cover image for Architectures and protocols for secure information technology infrastructures
6. 
Cover image for Responsive security  : be ready to be secure
7. 
Cover image for Intelligent systems for security informatics
10. 
Cover image for Threats, countermeasures, and advances in applied information security
11. 
Cover image for Asset protection through security awareness
12. 
Cover image for Auditing cloud computing : a security and privacy guide
13. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
14. 
Cover image for The art of enterprise information architecture : a systems-based approach for unlocking business insight
15. 
Cover image for Enterprise information security and privacy
16. 
Cover image for Information security management metrics : a definitive guide to effective security monitoring and measurement
17. 
Cover image for The executive guide to information security : threats, challenges, and solutions
24. 
Cover image for Information Security Governance : Framework and Toolset for CISOs and Decision Makers