Search Results for - Narrowed by: Computer security - Computer networks -- Security measures - Bacik, Sandy SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dAUTHOR$002509Author$002509Bacik$00252C$002bSandy$002509Bacik$00252C$002bSandy$0026ps$003d300?dt=list 2024-05-18T03:11:18Z Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:337596 2024-05-18T03:11:18Z 2024-05-18T03:11:18Z by&#160;Bacik, Sandy<br/>Author&#160;Bacik, Sandy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B36 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420059052<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:334683 2024-05-18T03:11:18Z 2024-05-18T03:11:18Z by&#160;Bacik, Sandy<br/>Author&#160;Bacik, Sandy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 2008<br/>Publisher&#160;CRC,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420059052<br/>