21
by Miller, William
Published 2015
AMACOM--American Management Association

22
by Landoll, Douglas J.
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4...

23
by Dal Lago, Alessandro
Published 2010
Taylor & Francis
Subjects: ...critical security...

24
by Watson, Scott A.
Published 2007
Syngress
Table of Contents: ... intelligence -- The art of war and homeland security...

25
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

26
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

27
by Jakob, Mark
Published 2021
Nomos Verlagsgesellschaft mbH & Co. KG

28
by Velthuizen, Andreas
Published 2024
Taylor & Francis
Subjects: ...Human Security;Epidemics;African Studies;Covid-19;Ebola;HIV-AIDS;Crisis Management;Policy Decision...

29
by Thompson, Eric C.
Published 2017
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... Regulator Expectations -- Chapter 3: Selecting Security Measures -- Part II: Assessing and Analyzing Risk...

30
by Landoll, Douglas J.
Published 2016
CRC Press
Table of Contents: ...Chapter 1. Introduction -- chapter 2. Information security policy basics -- chapter 3. Information...

31
by Ajmani, Neelesh, Kumar, Dinesh
Published 2017
Apress
Table of Contents: ...Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk...

32
by Gardner, Bill
Published 2014
Syngress
Subjects: ...Information storage and retrieval systems / Security measures...

33
by Siepmann, Frank
Published 2014
CRC Press
...Information security books...

34
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

35
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...: Intelligence Background; Chapter 3: Advantages of an Intelligence-Based Program; Chapter 4: Corporate Security...

36
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

37
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Creating a culture of security awareness -- ch. 2. Overview of security awareness categories...

38
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Table of Contents: ...Chapter 1 Introduction -- chapter 2 Introduction -- chapter 3 What Is an Information Security...

39
by Schuck, Julie Anne
Published 2017
The National Academies Press
Subjects: ...Security Measures...

40
by Luo, Suhuai
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...cyber-security...