Search Results for - Narrowed by: Computer security - Computer networks -- Security measures - Bacik, Sandy
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dAUTHOR$002509Author$002509Bacik$00252C$002bSandy$002509Bacik$00252C$002bSandy$0026ps$003d300?dt=list
2024-05-18T03:11:18Z
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:337596
2024-05-18T03:11:18Z
2024-05-18T03:11:18Z
by Bacik, Sandy<br/>Author Bacik, Sandy<br/>Format: Books<br/>Call Number QA76.9.A25 B36 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9781420059052<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:334683
2024-05-18T03:11:18Z
2024-05-18T03:11:18Z
by Bacik, Sandy<br/>Author Bacik, Sandy<br/>Format: Books<br/>Call Number QA76.9.A25 B32 2008<br/>Publisher CRC,<br/>Publication Date 2008<br/>ISBN 9781420059052<br/>