1
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

2
by Land, Michael
Published 2014
CRC Press
Table of Contents: ...Ch. 1. Introduction to security management -- ch. 2. Security management and critical thinking...

3
by Narayanan, Sudheesh
Published 2013
Packt Pub.
Subjects: ...Apache Hadoop / Security measures / blmlsh...

4
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

5
by Clarke, Justin
Published 2005
Safari Tech Books Online
Subjects: ...Computer security...

6
by Ricks, Truett A.
Published 2015
CRC Press
Table of Contents: ...Part 1. Security and safety planning -- part 2. Infrastructure protection...

7
by Arway, Arthur G.
Published 2013
CRC Press
Table of Contents: ...pt. 1. What is supply chain security? -- pt. 2. Developing a supply chain security program -- pt. 3...

8
by Cross, Michael
Published 2014
Syngress
Table of Contents: ... -- 7. The dark side -- 8. Risk management -- 9. Policies and privacy -- 10. Security -- 11. Where do we...

9
by Miller, William
Published 2015
AMACOM--American Management Association

10
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

11
by Landoll, Douglas J.
Published 2016
CRC Press
Table of Contents: ...Chapter 1. Introduction -- chapter 2. Information security policy basics -- chapter 3. Information...

12
by Ajmani, Neelesh, Kumar, Dinesh
Published 2017
Apress
Table of Contents: ...Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk...

13
by Gardner, Bill
Published 2014
Syngress
Subjects: ...Information storage and retrieval systems / Security measures...

14
by Siepmann, Frank
Published 2014
CRC Press
...Information security books...

15
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...: Intelligence Background; Chapter 3: Advantages of an Intelligence-Based Program; Chapter 4: Corporate Security...

16
by Crump, Justin
Published 2015
CRC Press, Taylor & Francis Group
Subjects: ...Corporations / Security measures / fast...

17
Published 2018
Routledge
Table of Contents: ... Developing, implementing and maintaining risk strategies; 1 Developments in risk security; 2 The evolution...

18
by Monte, Matthew
Published 2015
Wiley
Subjects: ...Computer security...

19
by Cook, Thomas A.
Published 2008
Auerbach Publications
Table of Contents: ...The events of 9/11 and how they affect global supply chains -- Compliance and security: import...

20
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...