Search alternatives:
securite » security, secure

1
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

2
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Table of Contents: ...Chapter 1 Introduction -- chapter 2 Introduction -- chapter 3 What Is an Information Security...

3
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

4
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Creating a culture of security awareness -- ch. 2. Overview of security awareness categories...

5
by Landoll, Douglas J.
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4...

6
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Subjects: ...BUSINESS & ECONOMICS / Corporate Governance / bisacsh...

7
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

8
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

9
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

10
by Kendrick, Rupert
Published 2010
IT Governance Pub.
Table of Contents: ...; CHAPTER 5: THE NEED FOR GOVERNANCE; CHAPTER 6: ASSESSING RISK; CHAPTER 7: RISK MANAGEMENT STRATEGIES; PART...

11
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ... access controls last reviewed?; What level of information security awareness is there across...

12
by Calder, Alan
Published 2008
IT Governance Publishing
Table of Contents: ...Introduction -- 1. What is ISO/IEC 38500? -- 2. The corporate governance context -- 3. Scope...

13
by Smallwood, Robert F.
Published 2014
John Wiley & Sons, Inc.
Table of Contents: ... Technology Functions -- Information Governance and Privacy and Security Functions -- Information Governance...

14
by Monte, Matthew
Published 2015
Wiley
Subjects: ...Computer security...

15
by Snedaker, Susan
Published 2007
Syngress
Table of Contents: ... Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters...

16
by Watson, Scott A.
Published 2007
Syngress
Table of Contents: ... intelligence -- The art of war and homeland security...

17
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

18
by Calder, Alan
Published 2008
IT Governance Pub.
Subjects: ...Systèmes d'information de gestion / Grande-Bretagne / Sécurité / Mesures / Planification...

19
by Photopoulos, Constantine
Published 2008
Syngress
Table of Contents: ... Security Policy -- Ch. 5. Response Program -- Ch. 6. Detection and Reporting -- Ch. 7. Evaluation...

20
by Fitzgerald, Todd
Published 2008
Auerbach Publications
Table of Contents: ...Chapter 18. Security PitfallsChapter 19. Security Leader Horizon Issues: What the Future Holds...