1
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

2
Published 2018
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

3
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Assessments 129 -- Cloud Security Alliance 130 -- Vendor Security Alliance 130 -- Sharing Data with Your...

4
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

5
by Peltier, Thomas R.
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ...1. Developing Policies -- 2. Organization of Information Security -- 3. Cryptology -- 4. Risk...

6
by Hettema, Hinne
Published 2022
Packt Publishing, Limited
Table of Contents: ...Table of Contents How Security Operations Are Changing Incident Response - A Key Capability...

7
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
Table of Contents: ...Security Information and Event Management (SIEM) -- Splunk -- Alert status -- IDS versus IPS...

8
by Sherwood, John, Clark, Andrew, Lynas, David
Published 2005
CRC Press
Table of Contents: ...Chapter 11: Logical Security ArchitectureChapter 12: Physical Security Architecture; Chapter 13...

9
by Carpenter, Perry, Roer, Kai
Published 2022
John Wiley & Sons, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Carpenter, Perry, Roer, Kai
Published 2022
Ascent Audio
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

11
by Sheward, Mike
Published 2020
BCS, The Chartered Institute for IT
Subjects: ...Computer security / thema...

12
by Brotby, W. Krag
Published 2013
CRC Press
Table of Contents: ... -- Introduction; Chapter 2 -- Why Measure Information Security?; Chapter 3 -- The Art and Science of Security...

13
by Katzer, Matthew A.
Published 2018
Apress
Table of Contents: ...1. Why Security and Compliance -- 2. Azure and Office 365 Security -- 3. Office 365- Security Score...

14
by Carpenter, Perry
Published 2019
Wiley
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

15
by Huang, Kaizhe, Jumde, Pranjal
Published 2020
Packt Publishing
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

16
by Wun-Young, Leslie
Published 2009
Syngress Pub.
Table of Contents: ...SAP Security Introduction; Authorization Concept and Security Mechanics; Security Administration...

17
by Gonzalez, Deborah
Published 2014
Butterworth-Heinemann
Subjects: ...Computer security...

18
by Crawley, Kim
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ...Foreword -- Introduction -- Chapter 1 Step 1: Foster a Strong Security Culture -- Kevin Mitnick...

19
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Business enterprises / Computer networks / Security measures / Auditing / Dictionaries...

20
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ...Current state of security -- Securing emails and Office 365 -- Device-level security -- Identity...