1
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

2
by Stackpole, Bill
Published 2010
Auerbach
Subjects: ...Computer security / Management...

3
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

4
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

5
by Peterson, Andrew
Published 2016
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

6
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

7
by Tibble, Ian
Published 2011
Auerbach
Subjects: ...Computer security...

8
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
Table of Contents: ...Security Information and Event Management (SIEM) -- Splunk -- Alert status -- IDS versus IPS...

9
by Cross, Michael
Published 2014
Syngress
Table of Contents: ... -- 7. The dark side -- 8. Risk management -- 9. Policies and privacy -- 10. Security -- 11. Where do we...

10
by Hayden, Lance
Published 2016
McGraw-Hill Education
Table of Contents: ...Machine generated contents note: Part I: Understanding Your Security Culture -- Chapter 1...

11
by Brotby, W. Krag
Published 2013
CRC Press
Table of Contents: ... -- Introduction; Chapter 2 -- Why Measure Information Security?; Chapter 3 -- The Art and Science of Security...

12
by Winkler, Ira
Published 2022
John Wiley
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

13
by Winkler, Ira
Published 2022
Tantor Media, Inc.
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

14
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ...The Fighting Stance: Security Awareness -- Developing a Security Focus: Identifying Critical Assets...

15
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Business enterprises / Computer networks / Security measures / Auditing / Dictionaries...

16
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ...Current state of security -- Securing emails and Office 365 -- Device-level security -- Identity...

17
by Brotby, Krag
Published 2009
Auerbach Publications
Subjects: ...Information technology / Security measures / fast...

18
by Wun-Young, Leslie
Published 2009
Syngress Pub.
Table of Contents: ...SAP Security Introduction; Authorization Concept and Security Mechanics; Security Administration...

19
by Calder, Alan
Published 2016
IT Governance Publishing
Subjects: ...Computer security / Information technology...

20
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...