1
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

2
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

3
by Clarke, Justin
Published 2005
Safari Tech Books Online
Subjects: ...Computer security...

4
by Cross, Michael
Published 2014
Syngress
Table of Contents: ... -- 7. The dark side -- 8. Risk management -- 9. Policies and privacy -- 10. Security -- 11. Where do we...

5
by Gardner, Bill
Published 2014
Syngress
Subjects: ...Information storage and retrieval systems / Security measures...

7
by Monte, Matthew
Published 2015
Wiley
Subjects: ...Computer security...

8
by McKendrick, Russ
Published 2018
Packt Publishing
Subjects: ...Computer networks / Security measures / Management...

9
by McKendrick, Russ
Published 2024
Packt Publishing Ltd.
Subjects: ...Computer networks / Security measures / Management...

10
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

11
by Rothrock, Ray A.
Published 2018
American Management Association
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

12
by Snedaker, Susan
Published 2014
Syngress
Table of Contents: ... regarding data and information security -- 3. Project initiation -- 4. Risk assessment -- 5. Business impact...

13
by Touhill, Gregory J., Touhill, C. J.
Published 2014
John Wiley & Sons
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

14
Published 2018
Routledge
Table of Contents: ...Leading the digital supply chain / David B. Kurz -- A framework to reduce iopts security breaches...

15
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
Table of Contents: ... Assessment and Management Team -- High-Risk Terminations and Building an Enhanced Security Plan -- Managing...

16
by Haughian, Barry
Published 2018
Apress
Table of Contents: ...Security Components; Data Protection; Chapter 4: The Service Organization; Service Business Owners...

17
by Brath, Richard, Jonker, David
Published 2015
John Wiley & Sons, Inc.
... and engaging set of examples from sports, finance, marketing, security, social media, and more. You will find...

18
by Ilag, Balu N.
Published 2018
Apress
Table of Contents: ...; Security and Compliance; Enabling Information Protection; Using Information Protection Flow; Auditing...

19
by Reed, Adrian
Published 2018
BCS, The Chartered Institute for IT
Table of Contents: ...; PREPARING A CV OR RÉSUMÉ; SEARCHING THE MARKET AND SECURING AN INTERVIEW; PREPARING FOR THE INTERVIEW...

20
by Lawler, James P.
Published 2008
Auerbach Publications
Table of Contents: ... Strategy; Security of SOA; Standards of...