Information security for managers
Information systems have improved over the years to become more effective in collecting and rendering information for consumers, although these improvements have been accompanied by increases in both frequency and sophistication of attacks against them. The impacts from attacks against companies are...
| Main Authors: | Workman, Michael D. 1957- (Author), Gathegi, John N. (Author), Phelps, Daniel C. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Burlington, Massachusetts :
Jones & Bartlett Learning ,
c2013
|
| Subjects: |
Similar Items
Digital business security development management technologies
by: Bryant, Kay 1954-, et al.
Published: (2011)
by: Bryant, Kay 1954-, et al.
Published: (2011)
Secure multi-party non-repudiation protocols and applications
by: Onieva, Jose A., et al.
Published: (2009)
by: Onieva, Jose A., et al.
Published: (2009)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2003)
by: Whitman, Michael E., et al.
Published: (2003)
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)
by: Collette, Ronald D., et al.
Published: (2009)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Information security and IT risk management
by: Agrawal, Manish, et al.
by: Agrawal, Manish, et al.
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2007)
by: Dhillon, Gurpreet 1963-
Published: (2007)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Building an effective information security policy architecture
by: Bacik, Sandy
Published: (2008)
by: Bacik, Sandy
Published: (2008)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Fundamentals of network security
by: Canavan, John E.
Published: (2001)
by: Canavan, John E.
Published: (2001)
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Securing the clicks network security in the age of social media
by: Bahadur, Gary, et al.
Published: (2012)
by: Bahadur, Gary, et al.
Published: (2012)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Computer and cyber security principles, algorithm, applications, and perspectives
How to cheat at securing your network
by: Dubrawsky, Ido
Published: (2007)
by: Dubrawsky, Ido
Published: (2007)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2014)
by: Andress, Jason
Published: (2014)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Security and resilience in intelligent data-centric systems and communication networks
CWSP guide to wireless security
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
Network security current status and future directions
by: Douligeris, C. (Christos), et al.
Published: (2007)
by: Douligeris, C. (Christos), et al.
Published: (2007)
Network security
by: Shaffer, Steven L.
Published: (1994)
by: Shaffer, Steven L.
Published: (1994)
Adaptive security management architecture
by: Tiller, James S.
Published: (2011)
by: Tiller, James S.
Published: (2011)
Similar Items
-
Digital business security development management technologies
by: Bryant, Kay 1954-, et al.
Published: (2011) -
Secure multi-party non-repudiation protocols and applications
by: Onieva, Jose A., et al.
Published: (2009) -
Principles of information security
by: Whitman, Michael E., et al.
Published: (2003) -
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009) -
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)