Managing information security : a program for the electronic information age
| Main Author: | Schweitzer, James A. |
|---|---|
| Format: | Book |
| Published: |
London :
Butterworth ,
c1982
|
| Subjects: |
Similar Items
Information security : protecting the global enterprise
by: Pipkin, Donald L.
Published: (2000)
by: Pipkin, Donald L.
Published: (2000)
It auditing : using control to protect information assets
by: Davis,Chris
Published: (2011)
by: Davis,Chris
Published: (2011)
Computers and information processing
by: Fuori, William M
Published: (1991)
by: Fuori, William M
Published: (1991)
Writing Information Security Policies
by: Barman, Scott
Published: (2002)
by: Barman, Scott
Published: (2002)
Information and Computer Science
by: Kimble, Gerald W.
Published: (1975)
by: Kimble, Gerald W.
Published: (1975)
Introduction to Information Processing
by: Spencer, Donald D.
Published: (1981)
by: Spencer, Donald D.
Published: (1981)
Information processing systems
by: Davis, William S.
Published: (1981)
by: Davis, William S.
Published: (1981)
Computers and Information Processing Today
by: Dunikoski, Robert H.
Published: (1989)
by: Dunikoski, Robert H.
Published: (1989)
Microsoft Windows security : essentials
by: Gibson,Darril
Published: (2011)
by: Gibson,Darril
Published: (2011)
Computer information systems
by: Burstein, Jerome S
Published: (1989)
by: Burstein, Jerome S
Published: (1989)
Komputer dan pemprosesan maklumat : Computers and information processing
by: Fuori, William M., et al.
Published: (1993)
by: Fuori, William M., et al.
Published: (1993)
Maximum security
Published: (2001)
Published: (2001)
Information Processing with Basic
by: Bohl, Merilyn
Published: (1984)
by: Bohl, Merilyn
Published: (1984)
Secrets & lies : digital security in a networked world
by: Schneier, Bruce
Published: (2000)
by: Schneier, Bruce
Published: (2000)
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005)
by: Rothke, Ben
Published: (2005)
Computer center operations
by: Wagner, Gerald E., et al.
Published: (1984)
by: Wagner, Gerald E., et al.
Published: (1984)
Hacker V : pakar keselamatan rangkaian : Norton internet security
by: PC, Man
Published: (2003)
by: PC, Man
Published: (2003)
Oliver and Chapman's Data Processing and Information Technology
by: French, C. S.
Published: (1996)
by: French, C. S.
Published: (1996)
Questions and Answers Data Processing and System Analysis : K.A Hindle,O.P Turner,M.E Stewart
by: Hindle K.A
Published: (1983)
by: Hindle K.A
Published: (1983)
Security in Computing
by: Pfleeger, Charles P.
Published: (1997)
by: Pfleeger, Charles P.
Published: (1997)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman
Published: (2007)
by: Kamaruzzaman Seman
Published: (2007)
Finding, selecting, developing and retaining data processing professionals through effective human resources management
by: Labelle, Charles
Published: (1983)
by: Labelle, Charles
Published: (1983)
Understanding : Computer science for advanced level
by: Bradley, Ray
Published: (1999)
by: Bradley, Ray
Published: (1999)
Essentials of Data Processing
by: Floyd, Nancy A.
Published: (1987)
by: Floyd, Nancy A.
Published: (1987)
Computer security : principles and practices
by: Stailings, William
Published: (2012)
by: Stailings, William
Published: (2012)
Computers and Information Processing : The Complete Couse with BASIC
by: Mandell, Steven L.
Published: (1989)
by: Mandell, Steven L.
Published: (1989)
Using PC Dos
by: DeVoney, Chris
Published: (1989)
by: DeVoney, Chris
Published: (1989)
Computers and information : an introduction
by: Orilia, Lawrence
Published: (1986)
by: Orilia, Lawrence
Published: (1986)
Internet in security
by: Hahn, Harley
Published: (2002)
by: Hahn, Harley
Published: (2002)
Building security : Handbook for architectural plamnning and design
by: Nadel, Barbara A
Published: (2004)
by: Nadel, Barbara A
Published: (2004)
Facility manager's guide to security : protecting your assets
by: Reid, Robert N.
Published: (2005)
by: Reid, Robert N.
Published: (2005)
Fundamentals of computing II : Abstraction, data structures, and large software systems
by: Tucker, Allan B.
Published: (1995)
by: Tucker, Allan B.
Published: (1995)
Linux security
by: Vulpecula
Published: (2004)
by: Vulpecula
Published: (2004)
Secure networking, with windows 2000 and trust services
by: Jalal Feghhi
Published: (2001)
by: Jalal Feghhi
Published: (2001)
Computer Concepts and Applications : with an lntroduction to Software and BASIC
by: O'Brien, James A.
Published: (1989)
by: O'Brien, James A.
Published: (1989)
Times computer dictionary : a guide to computer jargon
by: Wedge, Jon
Published: (1985)
by: Wedge, Jon
Published: (1985)
Cyber security management : a governance, risk and compliance framework
by: Trim, Peter R.J, et al.
Published: (2014)
by: Trim, Peter R.J, et al.
Published: (2014)
Transforming it culture : how to use social intelligence, human factors, and collaboration to create an IT department that outperforms
by: Wander, Frank
Published: (2013)
by: Wander, Frank
Published: (2013)
Security and crime prevention in libraries
Published: (1992)
Published: (1992)
Introduction to data processing
by: Harris, Martin L
Published: (1979)
by: Harris, Martin L
Published: (1979)
Similar Items
-
Information security : protecting the global enterprise
by: Pipkin, Donald L.
Published: (2000) -
It auditing : using control to protect information assets
by: Davis,Chris
Published: (2011) -
Computers and information processing
by: Fuori, William M
Published: (1991) -
Writing Information Security Policies
by: Barman, Scott
Published: (2002) -
Information and Computer Science
by: Kimble, Gerald W.
Published: (1975)