1
by Stewart, James Michael
Published 2009
Wiley Pub.
Table of Contents: ... identification and authentication (identity proofing).; 3.9 Explain and apply physical access security methods...

2
by Chapple, Mike, Stewart, James Michael, Gibson, Darril
Published 2021
John Wiley and Sons, Inc.
Table of Contents: ... Identification 123 -- Likelihood Assessment 125 -- Impact Analysis 126 -- Resource Prioritization 128...