Security metrics a beginner's guide
| Main Author: | Wong, Caroline (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York
McGraw-Hill
c2012
|
| Subjects: | |
| Online Access: | McGraw Hill |
Similar Items
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security
Published: (1986)
Published: (1986)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Information security management handbook Volume 4
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Security in computing
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Managing an information security and privacy awareness and training program
by: Herold, Rebecca
Published: (2011)
by: Herold, Rebecca
Published: (2011)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
How to secure and audit Oracle 10g and 11g
by: Ben-Natan, Ron
Published: (2009)
by: Ben-Natan, Ron
Published: (2009)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Designing an IAM framework with Oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Security an introduction
by: Purpura, Philip P. 1950-
Published: (2011)
by: Purpura, Philip P. 1950-
Published: (2011)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
PCI compliance understand and implement effective pci data security standard compliance
by: Williams, Branden, et al.
Published: (2015)
by: Williams, Branden, et al.
Published: (2015)
Similar Items
-
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010) -
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007) -
Personal computer security
by: Tiley, W. Edward
Published: (1996) -
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011) -
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)