Search alternatives:
securite » security, secure

1
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

2
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Table of Contents: ...Chapter 1 Introduction -- chapter 2 Introduction -- chapter 3 What Is an Information Security...

3
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

4
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Creating a culture of security awareness -- ch. 2. Overview of security awareness categories...

5
by Landoll, Douglas J.
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4...

6
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Subjects: ...BUSINESS & ECONOMICS / Corporate Governance / bisacsh...

7
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

8
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

9
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

10
by Kendrick, Rupert
Published 2010
IT Governance Pub.
Table of Contents: ...; CHAPTER 5: THE NEED FOR GOVERNANCE; CHAPTER 6: ASSESSING RISK; CHAPTER 7: RISK MANAGEMENT STRATEGIES; PART...

11
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ... access controls last reviewed?; What level of information security awareness is there across...

12
by Calder, Alan
Published 2008
IT Governance Publishing
Table of Contents: ...Introduction -- 1. What is ISO/IEC 38500? -- 2. The corporate governance context -- 3. Scope...

13
by Monte, Matthew
Published 2015
Wiley
Subjects: ...Computer security...

14
by Snedaker, Susan
Published 2007
Syngress
Table of Contents: ... Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters...

15
by Watson, Scott A.
Published 2007
Syngress
Table of Contents: ... intelligence -- The art of war and homeland security...

16
by Calder, Alan
Published 2008
IT Governance Pub.
Subjects: ...Systèmes d'information de gestion / Grande-Bretagne / Sécurité / Mesures / Planification...

17
by Photopoulos, Constantine
Published 2008
Syngress
Table of Contents: ... Security Policy -- Ch. 5. Response Program -- Ch. 6. Detection and Reporting -- Ch. 7. Evaluation...

18
by Fitzgerald, Todd
Published 2008
Auerbach Publications
Table of Contents: ...Chapter 18. Security PitfallsChapter 19. Security Leader Horizon Issues: What the Future Holds...

19
by Burges, Dan
Published 2013
Butterworth-Heinemann
Table of Contents: ... impact of cargo theft -- Determining risk -- Roles and responsibilities -- Physical security...

20
by Dunlap, E. Scott
Published 2011
CRC Press
Subjects: ...BUSINESS & ECONOMICS / Corporate Governance / bisacsh...