by
Benantar, Messaoud. author.
Format:
Electronic Resources
Excerpt:
Access Control Systems Security, Identity Management and Trust Models / Benantar, Messaoud. author.
by
Doruk, Alpay.
Format:
Manuscript
Excerpt:
Management Systems/ Doruk, Alpay.
View Other Search Results
by
Tong, Carrison K. S., 1962-
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-672-3
Format:
Electronic Resources
Excerpt:
Governance of picture archiving and communications systems data security and quality management of
by
Dowland, Paul. editor.
Format:
Electronic Resources
Excerpt:
Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG
by
Doruk, Alpay.
Format:
Books
Excerpt:
necessary to implement a successful security review program for intrusion management systems / Doruk, Alpay.
by
Griffor, Edward, editor.
Format:
Electronic Resources
Excerpt:
Handbook of system safety and security : cyber risk and risk management, cyber security, threat
by
Griffor, Edward R., editor.
Format:
Electronic Resources
Excerpt:
Handbook of system safety and security : cyber risk and risk management, cyber security, threat
by
Tipton, Harold F.
Format:
Electronic Resources
Excerpt:
Information Systems Security Management Professional Common Body of Knowledge
by
Cloutier, Roland, author.
Format:
Electronic Resources
Excerpt:
Security systems -- Management.
by
McCrie, Robert D., author.
Format:
Electronic Resources
Excerpt:
Security systems -- Management.
11.
by
Komendat, Dave, editor.
Format:
Electronic Resources
Excerpt:
Security systems -- Management.
by
Sondej, Allen R., author.
Format:
Electronic Resources
Excerpt:
Security systems -- Management.
Limit Search Results