Computer security handbook
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about h...
Saved in:
| Other Authors: | Bosworth, Seymour, Kabay, Michel E., Whyne, Eric |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hoboken, New Jersey
Wiley
2014
|
| Edition: | 6th ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Choosing and keeping computer staff recruitment, selection, and development of computer personnel
by: Chandor, Anthony
Published: (2017)
by: Chandor, Anthony
Published: (2017)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Managing information security
Published: (2014)
Published: (2014)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
Security t guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
From EDI to electronic commerce a business initiative
by: Sokol
Published: (1994)
by: Sokol
Published: (1994)
Online business computer applications
by: EliasonlhAlan L
by: EliasonlhAlan L
Psychological and behavioral examinations in cyber security
Published: (2018)
Published: (2018)
Auditing EDP systems /
by: Watne, Donald A.
Published: (1990)
by: Watne, Donald A.
Published: (1990)
Computer simulation
by: WatsonlhHugh J.
by: WatsonlhHugh J.
Computer Simulation
by: WatsonlhHugh J.
by: WatsonlhHugh J.
Introduction to information systems
by: O'Brien, James A.
Published: (2005)
by: O'Brien, James A.
Published: (2005)
Introduction to information systems
by: O'Brien , James A.
Published: (2005)
by: O'Brien , James A.
Published: (2005)
Computing in the information age
by: SternlhNancy B.
by: SternlhNancy B.
Information security--the next decade : proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
Published: (1995)
Published: (1995)
The price water house EDI handbook
by: lh
by: lh
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Understanding the Department of Homeland Security
by: Philpott, Don
Published: (2015)
by: Philpott, Don
Published: (2015)
The digital enterprise how digitisation is redefining business
by: Henning, Kay
Published: (1998)
by: Henning, Kay
Published: (1998)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Data communications for business a managerial approach
by: Schatt
Published: (1994)
by: Schatt
Published: (1994)
Managing academic support services in universities the convergence experience
Published: (2005)
Published: (2005)
Marketing analytics data-driven techniques with Microsoft Excel
by: Winston, Wayne L.
Published: (2014)
by: Winston, Wayne L.
Published: (2014)
Applied data communications and networks
by: Buchanan
Published: (1996)
by: Buchanan
Published: (1996)
Fundamentals of business data communications
by: Dennis, Alan, et al.
Published: (2018)
by: Dennis, Alan, et al.
Published: (2018)
Fuzzy logic & neurofuzzy applications in business & finance
by: Von Altrock
Published: (1996)
by: Von Altrock
Published: (1996)
The power of now how winning companies sense and respond to change using real-time technology
by: RanadivelhVivek
by: RanadivelhVivek
Analytics and big data for accountants
by: Lindell, Jim
Published: (2017)
by: Lindell, Jim
Published: (2017)
Business information systems
by: Clifton H.DlhHarold Dennis
by: Clifton H.DlhHarold Dennis
Similar Items
-
Choosing and keeping computer staff recruitment, selection, and development of computer personnel
by: Chandor, Anthony
Published: (2017) -
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015) -
Corporate computer and network security
by: Panko, R. R.
Published: (2010) -
Corporate computer and network security
by: Panko lhRaymond R -
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)


