1
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

2
by Berling, Trine Villumsen
Published 2022
Taylor & Francis
Subjects: ...security logics...

3
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

4
by Dal Lago, Alessandro
Published 2010
Taylor & Francis
Subjects: ...critical security...

5
by Duncan, Jane
Published 2022
Bloomsbury Academic
Subjects: ... Constitutional and administrative law: general::LNDH Government powers...

6
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

7
by Landoll, Douglas J.
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4...

8
by Watson, Scott A.
Published 2007
Syngress
Table of Contents: ... intelligence -- The art of war and homeland security...

10
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

11
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Creating a culture of security awareness -- ch. 2. Overview of security awareness categories...

12
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

13
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

14
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Table of Contents: ...Chapter 1 Introduction -- chapter 2 Introduction -- chapter 3 What Is an Information Security...

15
by Ajmani, Neelesh, Kumar, Dinesh
Published 2017
Apress
Table of Contents: ...Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk...

16
by Hossain, Kamrul
Published 2018
Taylor & Francis
Subjects: ...Human Security...

17
by Burges, Dan
Published 2013
Butterworth-Heinemann
Table of Contents: ... impact of cargo theft -- Determining risk -- Roles and responsibilities -- Physical security...

18
by Stock proprietor
Published 1785
Printed for J. Murray
Subjects: ...Government securities / Great Britain / History / 18th century...

19
by Carey, Mathew
Published 1829
s.n
Subjects: ...United States / Politics and government...

20
Published 1789
Chez Baudouin
Subjects: ...Government securities / France...