Contemporary security management
Saved in:
| Main Author: | Fay |
|---|---|
| Format: | Book |
| Published: |
Boston
Butterworth-Heinemann
2002
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Introduction to security
by: Fischer, Robert J.
Published: (2013)
by: Fischer, Robert J.
Published: (2013)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014)
by: Tufano, Andrew A
Published: (2014)
Introduction to executive protection
by: June, Dale L.
Published: (2016)
by: June, Dale L.
Published: (2016)
Security manual
by: Brooksbank
Published: (2007)
by: Brooksbank
Published: (2007)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Pembangunan budaya keselamatan di tempat kerja
by: Mohd Saidin Misnan, et al.
Published: (2011)
by: Mohd Saidin Misnan, et al.
Published: (2011)
Managing information security
Published: (2014)
Published: (2014)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Port security management
by: Christopher, Kenneth
Published: (2015)
by: Christopher, Kenneth
Published: (2015)
The John Adair handbook of management and leardership
Published: (1998)
Published: (1998)
Contemporary cryptology the science of information integrity
Published: (1992)
Published: (1992)
Maritime security an introduction
by: McNicholas, Michael
Published: (2016)
by: McNicholas, Michael
Published: (2016)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Secure communications applications and management
by: Sutton
Published: (2001)
by: Sutton
Published: (2001)
Maritime security protection of marinas, ports, small watercraft, yachts, and ships
by: Benny, Daniel J.
Published: (2016)
by: Benny, Daniel J.
Published: (2016)
Logistics and transportation security a strategic, tactical, and operational guide to resilience
by: Burns, Maria G.
Published: (2015)
by: Burns, Maria G.
Published: (2015)
Network security and management
by: Singh, Brijendra
Published: (2012)
by: Singh, Brijendra
Published: (2012)
Managing, a contemporary introduction
by: MassielhJoseph L.
by: MassielhJoseph L.
Global supply chain security and management appraising programs, preventing crimes
by: Prokop, Darren
Published: (2017)
by: Prokop, Darren
Published: (2017)
Transportation security
Published: (2008)
Published: (2008)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007)
by: Ritter
Published: (2007)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
How to develop and implement a security master plan
by: Giles, Timothy D.
Published: (2009)
by: Giles, Timothy D.
Published: (2009)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Information security a strategic approach
by: LeVeque
Published: (2006)
by: LeVeque
Published: (2006)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Security and software for cybercafes
Published: (2008)
Published: (2008)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Similar Items
-
Introduction to security
by: Fischer, Robert J.
Published: (2013) -
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016) -
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014) -
Introduction to executive protection
by: June, Dale L.
Published: (2016) -
Security manual
by: Brooksbank
Published: (2007)


