1
by McFall, Todd A.
Published 2014
Palgrave Macmillan US
...The economics of the NCAA Division I men's basketball league are peculiar because it fails to hire...

2
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

3
by Stackpole, Bill
Published 2010
Auerbach
Subjects: ...Computer security / Management...

4
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

5
by Land, Michael
Published 2014
CRC Press
Table of Contents: ...Ch. 1. Introduction to security management -- ch. 2. Security management and critical thinking...

6
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

7
by Guha-Khasnobis, Basudeb
Published 2007
Oxford University Press
... implications for food security across the globe. This volume attempts to redress the balance and provide a much...

8
by Ast, Scott
Published 2009
Auerbach Publications
Subjects: ...Corporations, American / Security measures / Foreign countries...

9
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

10
by Hayden, Lance
Published 2016
McGraw-Hill Education
Table of Contents: ...Machine generated contents note: Part I: Understanding Your Security Culture -- Chapter 1...

11
by MacWilliam, Scott
Published 2013
ANU E Press
...Securing Village Life: Development in Late Colonial Papua New Guinea examines the significance...

12
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ...The Fighting Stance: Security Awareness -- Developing a Security Focus: Identifying Critical Assets...

13
by Brotby, W. Krag
Published 2013
CRC Press
Table of Contents: ... -- Introduction; Chapter 2 -- Why Measure Information Security?; Chapter 3 -- The Art and Science of Security...

14
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
Table of Contents: ...Security Information and Event Management (SIEM) -- Splunk -- Alert status -- IDS versus IPS...

15
by Peterson, Andrew
Published 2016
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16
by Pearson, Robert L.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Electronic Alarm Systems -- Chapter 5Fire Systems -- Chapter 6Exterior and Interior Security Sensors...

17
by Tibble, Ian
Published 2011
Auerbach
Subjects: ...Computer security...

18
by Wayland, Bradley A.
Published 2014
Butterworth-Heinemann
Table of Contents: ...Front Cover; Security for Business Professionals: How to Plan, Implement, and Manage Your Company...

19
by Bohi, Douglas R., Toman, Michael A.
Published 1996
Springer Netherlands
Table of Contents: ... and Institutions -- Concluding Remarks -- Endnotes -- 6 Applications of Energy Security Externalities...

20
by Shaw, D. John
Published 2007
Palgrave Macmillan UK
... War to provide food security for all. It provides a reference source for all those involved...