Search Results for Computer security -- Handbooks, manuals, etcSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bHandbooks$00252C$002bmanuals$00252C$002betc$0026ps$003d300?dt=list2024-04-23T19:56:05ZComputing security & cryptography handbookent://SD_ILS/0/SD_ILS:8347472024-04-23T19:56:05Z2024-04-23T19:56:05Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number QA76.9.A25 C667 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632401137<br/>Information security management handbook Volume 7ent://SD_ILS/0/SD_ILS:8211412024-04-23T19:56:05Z2024-04-23T19:56:05Zby O'Hanley, Richard<br/>Author O'Hanley, Richard, Tiller, James S.<br/>Format: Books<br/>Call Number QA76.9.A25 I548 2014 r<br/>Edition 6th ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2014 2013<br/>ISBN 9781466567498<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:8312352024-04-23T19:56:05Z2024-04-23T19:56:05Zby Andress, Jason<br/>Author Andress, Jason, Winterfeld, Steve, Ablon, Lilian<br/>Format: Books<br/>Call Number U163 A53 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier.<br/>Publication Date 2013<br/>ISBN 9780124166721<br/>The computer incident response planning handbook : executable plans for protecting information at riskent://SD_ILS/0/SD_ILS:8013832024-04-23T19:56:05Z2024-04-23T19:56:05Zby McCarthy, N. K.<br/>Author McCarthy, N. K.<br/>Format: Books<br/>Call Number QA76.9.D314 M364 2012<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071790390<br/>Information security management handbook. Volume 5ent://SD_ILS/0/SD_ILS:8024242024-04-23T19:56:05Z2024-04-23T19:56:05Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Nozaki, Micki Krause<br/>Format: Books<br/>Call Number QA76.9.A25 I544 2012<br/>Edition 6th ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2012<br/>ISBN 9781439853450<br/>Information security management handbookent://SD_ILS/0/SD_ILS:8042422024-04-23T19:56:05Z2024-04-23T19:56:05Zby Tipton, Harold F. editor<br/>Author Tipton, Harold F. editor, Nozaki, Micki Krause editor<br/>Format: Books<br/>Call Number CP 034332<br/>Edition 2012 edition<br/>Publisher CRC Press / Taylor & Francis Group ;<br/>Publication Date 2012<br/>ISBN 9781439892091<br/>Information security management handbook Volume 6ent://SD_ILS/0/SD_ILS:8211552024-04-23T19:56:05Z2024-04-23T19:56:05Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Nozaki, Micki Krause<br/>Format: Books<br/>Call Number QA76.9.A25 I546 2012 r<br/>Edition 6th ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2012<br/>ISBN 9781439893135<br/>The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:8145512024-04-23T19:56:05Z2024-04-23T19:56:05Zby Wallace, Michael<br/>Author Wallace, Michael, Webber, Larry<br/>Format: Books<br/>Call Number CP 030990<br/>Edition 2nd ed.<br/>Publisher Amacom,<br/>Publication Date 2011<br/>ISBN 9780814416136<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:7488112024-04-23T19:56:05Z2024-04-23T19:56:05Zby Andress, Jason<br/>Author Andress, Jason, Winterfeld, Steve, Rogers, Russ<br/>Format: Books<br/>Call Number U163 A53 2011<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496377<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:7774732024-04-23T19:56:05Z2024-04-23T19:56:05Zby Wallace, Michael, 1960-<br/>Author Wallace, Michael, 1960-, Webber, Larry.<br/>Format: Books<br/>Call Number HD49 W36 2011<br/>Edition 2nd ed.<br/>Publisher American Management Association,<br/>Publication Date 2011<br/>ISBN 9780814416136<br/>Handbook of electronic security and digital forensicsent://SD_ILS/0/SD_ILS:3800082024-04-23T19:56:05Z2024-04-23T19:56:05Zby Jahankhani, Hamid<br/>Author Jahankhani, Hamid<br/>Format: Books<br/>Call Number QA76.9.A25 H364 2010<br/>Publisher World Scientific,<br/>Publication Date 2010<br/>ISBN 9789812837035<br/>Handbook of research on social and organizational liabilities in information securityent://SD_ILS/0/SD_ILS:6319252024-04-23T19:56:05Z2024-04-23T19:56:05Zby Gupta, Manish<br/>Author Gupta, Manish, Sharman, Raj.<br/>Format: Books<br/>Call Number QA76.9.A25 H365 2009 f<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605661322 9781605661339<br/>Handbook of research on information security and assuranceent://SD_ILS/0/SD_ILS:2933792024-04-23T19:56:05Z2024-04-23T19:56:05Zby Jatinder N. D. Gupta<br/>Author Jatinder N. D. Gupta, Gupta, Jatinder N. D.<br/>Format: Books<br/>Call Number TK5105.59 H353 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048550<br/>Information security management handbookent://SD_ILS/0/SD_ILS:1679132024-04-23T19:56:05Z2024-04-23T19:56:05Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Krause, Micki<br/>Format: Books<br/>Call Number QA76.9.A25 H36 2007<br/>Edition 6th ed<br/>Publisher Auerbach,<br/>Publication Date 2007<br/>ISBN 9780849374951<br/>Disaster recovery : principles and practicesent://SD_ILS/0/SD_ILS:1712382024-04-23T19:56:05Z2024-04-23T19:56:05Zby Wells, April J.<br/>Author Wells, April J., Walker, Charlyne, Walker, Timothy (Timothy R.)<br/>Format: Books<br/>Call Number HD49 W44 2006<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2007 2006<br/>ISBN 9780131711273<br/>How to cheat at securing a wireless networkent://SD_ILS/0/SD_ILS:1521222024-04-23T19:56:05Z2024-04-23T19:56:05Zby Hurley, Chris<br/>Author Hurley, Chris<br/>Format: Books<br/>Call Number TK5103.2 H874 2006<br/>Publisher Syngress,<br/>Publication Date 2006<br/>ISBN 9781597490870<br/>Computer security lab manualent://SD_ILS/0/SD_ILS:4338532024-04-23T19:56:05Z2024-04-23T19:56:05Zby Nestler, Vincent J.<br/>Author Nestler, Vincent J.<br/>Format: Books<br/>Call Number QA76.9.A25 C654 2006<br/>Publication Date 2006<br/>ISBN 9780072255089<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:4671172024-04-23T19:56:05Z2024-04-23T19:56:05Zby Rothke, Ben<br/>Author Rothke, Ben<br/>Format: Books<br/>Call Number HF5548.37 R67 2005<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2005<br/>ISBN 9780072262827<br/>The secure online business handbook : e-commerce, IT functionality & business continuityent://SD_ILS/0/SD_ILS:1141992024-04-23T19:56:05Z2024-04-23T19:56:05Zby Reuvid, Jonathan<br/>Author Reuvid, Jonathan, Institute of Directors, Simmons & Simmons<br/>Format: Books<br/>Call Number QA76.9.A25 S425 2005<br/>Edition 3rd ed.<br/>Publisher Kogan Page,<br/>Publication Date 2005<br/>ISBN 9780749444259<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:3544052024-04-23T19:56:05Z2024-04-23T19:56:05Zby Wallace, Michael, 1960-<br/>Author Wallace, Michael, 1960-, Webber, Lawrence, 1954-<br/>Format: Books<br/>Call Number HD49 W36 2004<br/>Publisher American Management Association,<br/>Publication Date 2004<br/>ISBN 9780814472408<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:6036862024-04-23T19:56:05Z2024-04-23T19:56:05Zby Wallace, Michael, 1960-<br/>Author Wallace, Michael, 1960-, Webber, Lawrence, 1954-<br/>Format: Computer file<br/>Call Number CP 4169<br/>Publisher American Management Association,<br/>Publication Date 2004<br/>Information security management handbookent://SD_ILS/0/SD_ILS:4011662024-04-23T19:56:05Z2024-04-23T19:56:05Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Krause, Micki<br/>Format: Books<br/>Call Number QA76.9.A25 H36 2004<br/>Edition 5th ed.<br/>Publisher Auerbach,<br/>Publication Date 2004<br/>ISBN 9780849319976<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:3632972024-04-23T19:56:05Z2024-04-23T19:56:05Zby Rothke, Ben<br/>Author Rothke, Ben<br/>Format: Books<br/>Call Number HF5548.37 R67 2004<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2004<br/>ISBN 9780072230833<br/>A handbook on ICT Set-up and securityent://SD_ILS/0/SD_ILS:3522082024-04-23T19:56:05Z2024-04-23T19:56:05Zby Hatta Mohd. Yusoff<br/>Author Hatta Mohd. Yusoff<br/>Format: Books<br/>Call Number QA76.9 H374 2003<br/>Publisher Utusan Pubs. & Distri.,<br/>Publication Date 2003<br/>ISBN 9789676114877<br/>Information security management handbookent://SD_ILS/0/SD_ILS:3131852024-04-23T19:56:05Z2024-04-23T19:56:05Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Krause, Micki<br/>Format: Books<br/>Call Number QA76.9.A25 H36 2002<br/>Edition 4th ed (v.3).<br/>Publisher Auerbach Pubs. ,<br/>Publication Date 2002<br/>ISBN 9780849311277<br/>Malaysian public sector management of information & communications technology security handbook (MyMIS)ent://SD_ILS/0/SD_ILS:5428922024-04-23T19:56:05Z2024-04-23T19:56:05Zby Malaysia. Prime Minister's Department. Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)<br/>Author Malaysia. Prime Minister's Department. Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)<br/>Format: Continuing Resources<br/>Call Number HD9502.M3 M34 2001<br/>Publisher Malaysian Administrative Modernisation and Management Planning Unit, Prime Minister's Department<br/>Publication Date 2001<br/>ISBN 9789839827163<br/>Handbook of information security management 1999ent://SD_ILS/0/SD_ILS:1208422024-04-23T19:56:05Z2024-04-23T19:56:05Zby Krause, Micki<br/>Author Krause, Micki, Tipton, Harold F.<br/>Format: Books<br/>Call Number QA76.9.A25 H36 1999<br/>Publisher Auerbach Pub.,<br/>Publication Date 1999<br/>ISBN 9780849399749<br/>Information security manualent://SD_ILS/0/SD_ILS:3316252024-04-23T19:56:05Z2024-04-23T19:56:05Zby United States. Administration and Resources Management<br/>Author United States. Administration and Resources Management, United States. Environmental Protection Agency<br/>Format: Books<br/>Call Number HF5548.2.I53 1989<br/>Publisher United States Environmental Protection Agency,<br/>Publication Date 1989<br/>Information security manual for personal computersent://SD_ILS/0/SD_ILS:3328292024-04-23T19:56:05Z2024-04-23T19:56:05Zby United States. Environmental Protection Agency<br/>Author United States. Environmental Protection Agency, United States. Administration and Resources Management<br/>Format: Books<br/>Call Number HF5548.2.I54 1989<br/>Publisher United States Environmental Protection Agency,<br/>Publication Date 1989<br/>Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systemsent://SD_ILS/0/SD_ILS:3420982024-04-23T19:56:05Z2024-04-23T19:56:05Zby Meyer, Carl H.<br/>Author Meyer, Carl H., Matyas, Stephen M.<br/>Format: Books<br/>Call Number Z103.M49 1982<br/>ISBN 9780471048923<br/>