by
Qian, Yi.
Format:
Electronic Resources
Excerpt:
Information Assurance : Dependability and Security in Networked Systems. Qian, Yi.
by
Qian, Yi, 1962-
Format:
Electronic Resources
Excerpt:
Information assurance : dependability and security in networked systems / Qian, Yi, 1962-
View Other Search Results
by
Lopez, Javier.
Format:
Electronic Resources
Excerpt:
Securing Information and Communications Systems : Principles, Technologies, and Applications. Lopez
by
Fugini, Mariagrazia, 1957-
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5
Format:
Electronic Resources
Excerpt:
Information security policies and actions in modern integrated systems Fugini, Mariagrazia, 1957-
by
D'Arcy, John P.
Format:
Electronic Resources
Excerpt:
Misuse of Information Systems : The Impact of Security Countermeasures. D'Arcy, John P.
by
Warkentin, Merrill.
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3
Format:
Electronic Resources
Excerpt:
Enterprise information systems assurance and system security managerial and technical issues /
by
Chapple, Mike.
Format:
Electronic Resources
Excerpt:
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests. Chapple
by
Hawker, Andrew.
Format:
Electronic Resources
Excerpt:
Security and Control in Information Systems : A Guide for Business and Accounting. Hawker, Andrew.
9.
by
CALDER, ALAN.
Format:
Electronic Resources
Excerpt:
Network and information systems (nis) regulations - a pocket guide for digital service providers.
by
Anton, Philip S.
Format:
Electronic Resources
Excerpt:
Finding and Fixing Vulnerabilities in Information Systems : The Vulnerability Assessment and
by
Calder, Alan, author.
Format:
Electronic Resources
Excerpt:
Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential
by
Kovacich, Gerald L., author.
Format:
Electronic Resources
Excerpt:
The information systems security officer's guide : establishing and managing a cyber security
Limit Search Results
Narrowed by: