1
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

2
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

3
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

4
by Watkins, Steve
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

5
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

6
by Myers, Kenneth N.
Published 2006
Wiley
Table of Contents: ...BUSINESS CONTINUITY STRATEGIES: PROTECTING AGAINST UNPLANNED DISASTERS; CONTENTS; PREFACE; Chapter...

7
by Wood, Phillip
Published 2012
IT Governance Pub.

8
by Calder, Alan
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

10
by Bowman, Ronald H.
Published 2008
John Wiley & Sons
Table of Contents: ... and Consequences -- 9. Government's Role: Summary of National Infrastructure Protection Plan of 2006 -- 10. Tier 4...

11
by Photopoulos, Constantine
Published 2008
Syngress
Subjects: ...Data protection / fast...

12
by Maravelas, Anna
Published 2005
Career Press
...How leaders and their employees can protect their sanity and productivity from tension and turf...

13
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

14
by Landoll, Douglas J.
Published 2011
CRC Press
Subjects: ...Data protection / fast...

15
by Sarsfield, Steve
Published 2009
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Planification...

16
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Subjects: ...Data protection / fast...

17
by Calder, Alan
Published 2005
IT Governance Pub.
Table of Contents: ...; CHAPTER 11 DATA PROTECTION AND PRIVACY; CHAPTER 12 ANTI SPAM LEGISLATION; CHAPTER 13 COMPUTER MISUSE...

18
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

19
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ... protection in your organisation?; Of the assets identified, how many servers are there?; What about...

20
by Unhelkar, Bhuvan
Published 2011
CRC Press
Subjects: ...Technologie de protection de l'environnement...