Protecting business information a manager's guide
| Main Author: | Schweitzer, James A. (Author) |
|---|---|
| Format: | Book |
| Published: |
Boston ; Oxford
Butterworth-Heinemann
c1996
|
| Subjects: |
Similar Items
UNIX system security how to protect your date and prevent intruders
by: Farrow, Rik 1950-
Published: (1991)
by: Farrow, Rik 1950-
Published: (1991)
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)
by: Collette, Ronald D., et al.
Published: (2009)
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Business intelligence making decisions through data analytics
by: Surma, Jerzy, et al.
Published: (2011)
by: Surma, Jerzy, et al.
Published: (2011)
Microsoft Office 2007 business intelligence [ reporting, analysis, and measurement from the desktop
by: Harts, Doug
Published: (2008)
by: Harts, Doug
Published: (2008)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Successful business intelligence secrets to making BI a killer app
by: Howson, Cindi
Published: (2008)
by: Howson, Cindi
Published: (2008)
Digital copyright protection
by: Wayner, Peter 1964-
Published: (1997)
by: Wayner, Peter 1964-
Published: (1997)
Audit and control of information system
by: Gallegos, Frederick, et al.
Published: (1987)
by: Gallegos, Frederick, et al.
Published: (1987)
Audit and control of information system
by: Gallegos, Frederick, et al.
Published: (1987)
by: Gallegos, Frederick, et al.
Published: (1987)
Modern enterprise business intelligence and data management a roadmap for IT directors, managers, and architects
by: Simon, Alan
Published: (2014)
by: Simon, Alan
Published: (2014)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Business intelligence and data warehousing
by: Dhingra, Sanjay, et al.
Published: (2012)
by: Dhingra, Sanjay, et al.
Published: (2012)
IT auditing using controls to protect information assets
by: Davis, Chris (Christopher Michael), et al.
Published: (2011)
by: Davis, Chris (Christopher Michael), et al.
Published: (2011)
Internet content regulation contemporary legal and regulatory issues in the changing digital landscape
by: Mahyuddin Daud
Published: (2019)
by: Mahyuddin Daud
Published: (2019)
Organization and management of a computer center
by: Graef, Martin, et al.
Published: (1985)
by: Graef, Martin, et al.
Published: (1985)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Hacking exposed 6 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Hacking exposed network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Mobile device security : a comprehensive guide to securing your information in a moving world
by: Fried, Stephen , 1962-
Published: (2010)
by: Fried, Stephen , 1962-
Published: (2010)
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Information security management handbook Volume 4
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
Enterprise business intelligence and data warehousing program management essentials
by: Simon, Alan R.
Published: (2015)
by: Simon, Alan R.
Published: (2015)
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
EDP : controls and auditing
by: Porter, W. Thomas
Published: (1974)
by: Porter, W. Thomas
Published: (1974)
EDP controls and auditing
by: Porter, W. Thomas, et al.
Published: (1984)
by: Porter, W. Thomas, et al.
Published: (1984)
The legal protection of trade secrets
by: Coleman, Allison
Published: (1992)
by: Coleman, Allison
Published: (1992)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Information security for managers
by: Workman, Michael D. 1957-, et al.
Published: (2013)
by: Workman, Michael D. 1957-, et al.
Published: (2013)
Similar Items
-
UNIX system security how to protect your date and prevent intruders
by: Farrow, Rik 1950-
Published: (1991) -
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009) -
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011) -
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987) -
Business intelligence making decisions through data analytics
by: Surma, Jerzy, et al.
Published: (2011)