Information security : protecting the global enterprise
| Main Author: | Pipkin, Donald L. |
|---|---|
| Format: | Book |
| Published: |
Upper Saddle River, N.J :
Prentice Hall ,
2000
|
| Subjects: |
Similar Items
Writing Information Security Policies
by: Barman, Scott
Published: (2002)
by: Barman, Scott
Published: (2002)
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005)
by: Rothke, Ben
Published: (2005)
Security in Computing
by: Pfleeger, Charles P.
Published: (1997)
by: Pfleeger, Charles P.
Published: (1997)
Microsoft Windows security : essentials
by: Gibson,Darril
Published: (2011)
by: Gibson,Darril
Published: (2011)
Data rescue
Published: (2006)
Published: (2006)
It auditing : using control to protect information assets
by: Davis,Chris
Published: (2011)
by: Davis,Chris
Published: (2011)
Managing information security : a program for the electronic information age
by: Schweitzer, James A.
Published: (1982)
by: Schweitzer, James A.
Published: (1982)
Secrets & lies : digital security in a networked world
by: Schneier, Bruce
Published: (2000)
by: Schneier, Bruce
Published: (2000)
Privacy, regulations, and cybersecurity : the essential business guide
by: Moschovitis, Christos J. P.
Published: (2021)
by: Moschovitis, Christos J. P.
Published: (2021)
Hacker V : pakar keselamatan rangkaian : Norton internet security
by: PC, Man
Published: (2003)
by: PC, Man
Published: (2003)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman
Published: (2007)
by: Kamaruzzaman Seman
Published: (2007)
Maximum security
Published: (2001)
Published: (2001)
Computer security : principles and practices
by: Stailings, William
Published: (2012)
by: Stailings, William
Published: (2012)
Facility manager's guide to security : protecting your assets
by: Reid, Robert N.
Published: (2005)
by: Reid, Robert N.
Published: (2005)
Linux security
by: Vulpecula
Published: (2004)
by: Vulpecula
Published: (2004)
The malaysian public sector information security risk assessment methodology (MyRAM)
Published: (2005)
Published: (2005)
Building security : Handbook for architectural plamnning and design
by: Nadel, Barbara A
Published: (2004)
by: Nadel, Barbara A
Published: (2004)
The malaysian public sector information security risk assessment methodology (MyRAM) handbook
Published: (2005)
Published: (2005)
Secure networking, with windows 2000 and trust services
by: Jalal Feghhi
Published: (2001)
by: Jalal Feghhi
Published: (2001)
The malaysian public sector information security high-level risk assessment (HiLRA) tool
Published: (2005)
Published: (2005)
The malaysian public sector information security high-level risk assessment (HiLRA) guide
Published: (2005)
Published: (2005)
Security and crime prevention in libraries
Published: (1992)
Published: (1992)
Internet in security
by: Hahn, Harley
Published: (2002)
by: Hahn, Harley
Published: (2002)
Hacking exposed : web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
Kursus Keselamatan Server 13-14 Mei 2025
Published: (2025)
Published: (2025)
Construction site security
by: Earnshaw, Leonard
Published: (1984)
by: Earnshaw, Leonard
Published: (1984)
Cyber security management : a governance, risk and compliance framework
by: Trim, Peter R.J, et al.
Published: (2014)
by: Trim, Peter R.J, et al.
Published: (2014)
Security : Its management and control
by: Hill, D. A.
Published: (1981)
by: Hill, D. A.
Published: (1981)
Security+ Guide to Network Security Fundamentals
by: Ciampa, Mark
Published: (2005)
by: Ciampa, Mark
Published: (2005)
Start-up secure : baking cybersecurity into your company from founding to exit
by: Castaldo, Chris
Published: (2021)
by: Castaldo, Chris
Published: (2021)
Pengenalan kepada keselamatan komputer
by: Omar Zakaria
Published: (2002)
by: Omar Zakaria
Published: (2002)
Electrical and mechanical services in high rise buildings : design and estimation manual
by: Mittal, A.K
Published: (2007)
by: Mittal, A.K
Published: (2007)
Kursus kesihatan dan keselamatan bangunan : 25 - 27 Mei 2015
Rights in security
by: Sheridan, L.A
Published: (1974)
by: Sheridan, L.A
Published: (1974)
Kursus Keselamatan Perlindungan : 23 - 25 Januari 2006
Published: (2006)
Published: (2006)
Viruses Revealed
by: Harley, David
Published: (2001)
by: Harley, David
Published: (2001)
Internet Security for Your Macintosh : a guide for the rest of US
by: Oppenheimer, Alan B.
Published: (2001)
by: Oppenheimer, Alan B.
Published: (2001)
Securities regulation in Singapore and Malaysia : a primer on the laws of the stock market with cases and materials
by: Theng Tan Pheng
Published: (1977)
by: Theng Tan Pheng
Published: (1977)
Access denied : The complete guide to protecting your business online
by: McCallough, Jack
Published: (2001)
by: McCallough, Jack
Published: (2001)
Oliver and Chapman's Data Processing and Information Technology
by: French, C. S.
Published: (1996)
by: French, C. S.
Published: (1996)
Similar Items
-
Writing Information Security Policies
by: Barman, Scott
Published: (2002) -
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005) -
Security in Computing
by: Pfleeger, Charles P.
Published: (1997) -
Microsoft Windows security : essentials
by: Gibson,Darril
Published: (2011) -
Data rescue
Published: (2006)