Limit Search Results
Language
Format
24 Results Found Subscribe to search results
000000000000MAIN
Print
1. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
2. 
Cover image for Security without obscurity : a guide to confidentiality, authentication, and integrity
3. 
Cover image for Architectures and protocols for secure information technology infrastructures
4. 
Cover image for Responsive security  : be ready to be secure
5. 
Cover image for Intelligent systems for security informatics
8. 
Cover image for Threats, countermeasures, and advances in applied information security
9. 
Cover image for Asset protection through security awareness
10. 
Cover image for Auditing cloud computing : a security and privacy guide
11. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
12. 
Cover image for The art of enterprise information architecture : a systems-based approach for unlocking business insight