Security manual
Saved in:
| Main Author: | Brooksbank |
|---|---|
| Format: | Book |
| Published: |
Hampshire, England
Gower
2007
|
| Edition: | 8th ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007)
by: Ritter
Published: (2007)
Security and loss prevention an introduction
by: Purpura, Philip P., 1950-
Published: (2013)
by: Purpura, Philip P., 1950-
Published: (2013)
The market for force the consequences of privatizing security
by: Avant, Deborah D. 1958-
Published: (2005)
by: Avant, Deborah D. 1958-
Published: (2005)
Private military and security companies ethics, policies and civil-military relations
Published: (2008)
Published: (2008)
Contemporary security management
by: Fay
Published: (2002)
by: Fay
Published: (2002)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Pembangunan budaya keselamatan di tempat kerja
by: Mohd Saidin Misnan, et al.
Published: (2011)
by: Mohd Saidin Misnan, et al.
Published: (2011)
Introduction to security
by: Fischer, Robert J.
Published: (2013)
by: Fischer, Robert J.
Published: (2013)
Maritime security protection of marinas, ports, small watercraft, yachts, and ships
by: Benny, Daniel J.
Published: (2016)
by: Benny, Daniel J.
Published: (2016)
Maritime security an introduction
by: McNicholas, Michael
Published: (2016)
by: McNicholas, Michael
Published: (2016)
Logistics and transportation security a strategic, tactical, and operational guide to resilience
by: Burns, Maria G.
Published: (2015)
by: Burns, Maria G.
Published: (2015)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Transportation security
Published: (2008)
Published: (2008)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Secure communications applications and management
by: Sutton
Published: (2001)
by: Sutton
Published: (2001)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Fourth-generation corporate security asymmetrical warfare for protective services professionals
by: Godlewski, R.J
Published: (2014)
by: Godlewski, R.J
Published: (2014)
Security and software for cybercafes
Published: (2008)
Published: (2008)
Security and privacy issues in sensor networks and IoT
Published: (2020)
Published: (2020)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Water supply systems security
Published: (2004)
Published: (2004)
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
Formulating an Arab approach to maritime security
by: Saleh Al-Wahishi, Ahmed Salem
Published: (2014)
by: Saleh Al-Wahishi, Ahmed Salem
Published: (2014)
Industrial cybersecurity efficiently secure critical infrastructure systems
by: Ackerman, Pascal
Published: (2017)
by: Ackerman, Pascal
Published: (2017)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Lloyd's MIU handbook of maritime security
Published: (2009)
Published: (2009)
Web security sourcebook
by: Rubin
Published: (1997)
by: Rubin
Published: (1997)
Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing
by: Buttyan, Levente
Published: (2008)
by: Buttyan, Levente
Published: (2008)
Wireless communications security
by: Imai
Published: (2005)
by: Imai
Published: (2005)
Similar Items
-
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007) -
Security and loss prevention an introduction
by: Purpura, Philip P., 1950-
Published: (2013) -
The market for force the consequences of privatizing security
by: Avant, Deborah D. 1958-
Published: (2005) -
Private military and security companies ethics, policies and civil-military relations
Published: (2008) -
Contemporary security management
by: Fay
Published: (2002)


