Information security management handbook, 2008 CD-ROM edition
This CD-ROM contains an extra volume's worth of information that is not found anywhere else, including chapters from other security and networking books that have never appeared in the print editions
Saved in:
| Other Authors: | Krause, Micki (Editor), Tipton, Harold F. (Editor) |
|---|---|
| Format: | Electronic |
| Language: | English |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Mastering CD ROM technology
by: Boden
Published: (1995)
by: Boden
Published: (1995)
The CD-ROM book
by: Bosak, Steve
Published: (1994)
by: Bosak, Steve
Published: (1994)
The CD ROM handbook
Published: (1994)
Published: (1994)
Building N-Tier applications with CD-Rom and visual basic 6.0
by: Rofail
Published: (1999)
by: Rofail
Published: (1999)
Building N-Tier applicatios with CD-ROM and visual basic 6.0
by: Rofail
Published: (1999)
by: Rofail
Published: (1999)
Writing for new media the essential guide to writing for intractive media CD-ROMS and the web
by: Bonime
Published: (1997)
by: Bonime
Published: (1997)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Multimedia literacy
by: Hofstetter
Published: (1997)
by: Hofstetter
Published: (1997)
Information Security Management Handbook
Published: (2012)
Published: (2012)
IWriting for new media the essential guide to writing for interactive media,CD-Roms,and the web
by: Bonime
Published: (1997)
by: Bonime
Published: (1997)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2012)
Published: (2012)
The lipid handbook with CD-ROM
by: Gunstone , F.D, et al.
Published: (2007)
by: Gunstone , F.D, et al.
Published: (2007)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Heart sounds made easy
Published: (2002)
Published: (2002)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Information protection playbook
Published: (2013)
Published: (2013)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published: (2009)
Published: (2009)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Improving information security practices through computational intelligence
Published: (2016)
Published: (2016)
Gray Hat Hacking: The Ethical Hacker's Handbook
by: Harper, Allen
Published: (2022)
by: Harper, Allen
Published: (2022)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Nursing spectrum drug handbook, 2008
Published: (2008)
Published: (2008)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Similar Items
-
Mastering CD ROM technology
by: Boden
Published: (1995) -
The CD-ROM book
by: Bosak, Steve
Published: (1994) -
The CD ROM handbook
Published: (1994) -
Building N-Tier applications with CD-Rom and visual basic 6.0
by: Rofail
Published: (1999) -
Building N-Tier applicatios with CD-ROM and visual basic 6.0
by: Rofail
Published: (1999)


