Search alternatives:
securite » security, secure

1
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

2
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Table of Contents: ...Chapter 1 Introduction -- chapter 2 Introduction -- chapter 3 What Is an Information Security...

3
by Berling, Trine Villumsen
Published 2022
Taylor & Francis
Subjects: ...security logics...

4
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

5
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Creating a culture of security awareness -- ch. 2. Overview of security awareness categories...

6
by Landoll, Douglas J.
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4...

7
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Subjects: ...BUSINESS & ECONOMICS / Corporate Governance / bisacsh...

8
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

9
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

10
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

12
by Kendrick, Rupert
Published 2010
IT Governance Pub.
Table of Contents: ...; CHAPTER 5: THE NEED FOR GOVERNANCE; CHAPTER 6: ASSESSING RISK; CHAPTER 7: RISK MANAGEMENT STRATEGIES; PART...

13
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ... access controls last reviewed?; What level of information security awareness is there across...

14
by Duncan, Jane
Published 2022
Bloomsbury Academic
Subjects: ... Constitutional and administrative law: general::LNDH Government powers...

15
by Dal Lago, Alessandro
Published 2010
Taylor & Francis
Subjects: ...critical security...

16
by Calder, Alan
Published 2008
IT Governance Publishing
Table of Contents: ...Introduction -- 1. What is ISO/IEC 38500? -- 2. The corporate governance context -- 3. Scope...

17
by Smallwood, Robert F.
Published 2014
John Wiley & Sons, Inc.
Table of Contents: ... Technology Functions -- Information Governance and Privacy and Security Functions -- Information Governance...

18
by Wilson Rowe, Elana
Published 2018
Manchester University Press
Subjects: ...Politics and government...

19
Published 1789
Chez Baudouin
Subjects: ...Government securities / France...

20
by Monte, Matthew
Published 2015
Wiley
Subjects: ...Computer security...