1
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

2
by Davies, Sandi J.
Published 2008
Butterworth-Heinemann/Elsevier
Table of Contents: ...; Conclusion; References; Recruitment and Retention of Security Personnel; Unit II-2: Security Personnel...

3
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...: Intelligence Background; Chapter 3: Advantages of an Intelligence-Based Program; Chapter 4: Corporate Security...

4
by Smith, Clifton
Published 2013
Butterworth-Heinemann
Table of Contents: ...-driven Security; Security of groups; The Law and Social Contract; Public Security (Policing); Private...

5
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... 117 -- GDPR 117 -- Privacy Shield 118 -- UK Cyber Essentials 118 -- United States Federal and State...

6
by Nathans, David
Published 2015
Syngress
Subjects: ...Private security services / Management / fast...

7
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ... and content filtering / Steven Lovaas -- Virtual private networks and secure remote access / Justin Opatrny...

8
by Purpura, Philip P.
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...The history of security and loss prevention : a critical perspective -- The business, careers...

9
by Katz, David S., Caspi, Ilan
Published 2020
Wiley
Subjects: ...Private security services / fast...

10
by Siepmann, Frank
Published 2014
CRC Press
Subjects: ...Risk assessment / fast...

11
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

12
by Messier, Ric
Published 2014
Syngress
Table of Contents: ...; History of the Internet; Significant security events; Evolution of services; Today's risks (in a Nutshell...

13
Published 2020
Wiley
Table of Contents: ... -- The Entity's System Objectives and Principal System Objectives -- Selecting the Trust Services Category...

14
by Fowler, Bradley
Published 2023
Apress
Table of Contents: ... Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud...

15
by Rohmeyer, Paul, Bayuk, Jennifer L.
Published 2019
Springer
Subjects: ...COMPUTERS / Security / Online Safety & Privacy / bisacsh...

16
by Edwards, Frances L., Goodrich, Daniel C.
Published 2016
Taylor and Francis
Table of Contents: ...SAFETY, SECURITY, AND EMERGENCY MANAGEMENT -- Security Theory and Practice -- Safety, Security...

17
by Cheswick, William, Bellovin, Steven, Rubin, Aviel
Published 2003
Addison-Wesley Professional
Subjects: ...Information technology / Security measures / fast...

18
by Sarkar, Pushpak
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... -- Appendix A Data Standards Initiatives and Resources 297 -- Appendix B Data Privacy & Security Regulations...

19
by Death, Darren
Published 2017
Packt Publishing
Table of Contents: ...Security control implementation -- Assessing implemented security controls -- Authorizing...

20
Published 2018
Routledge
Table of Contents: ...Leading the digital supply chain / David B. Kurz -- A framework to reduce iopts security breaches...