Your search returned 20 results.

Not what you expected? Check for suggestions
|
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.

by Calder, Alan, 1957- | Watkins, Steve, 1970-.

Edition: Sixth edition.Publisher: London ; Philadelphia, PA : Kogan Page, 2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAL 2015] (2).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PFL 2007] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.

by Fried, Stephen, 1962-.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FRI 2010] (2).
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart.

Publisher: Hoboken, N.J. : Wiley : IEEE Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2011] (2).
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.

by Basin, David | Schaller, Patrick | Schläpfer, Michael.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAS 2011] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll.

by Landoll, Douglas J.

Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2011] (1).
Security de-engineering : solving the problems in information risk management / Ian Tibble.

by Tibble, Ian.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 TIB 2012] (1).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.

by Rosado, David G, 1977- | IGI Global.

Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.

by Calder, Alan, 1957- | Watkins, Steve, 1970-.

Edition: Fifth edition.Publisher: London ; Philadelphia : Kogan Page, 2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAL 2012] (2).
Security in computing / Charles P. Pfleeger

by Pfleeger, Charles P, 1948-.

Edition: 2nd ed.Publisher: Upper Saddle River, N. J. : Prentice Hall, 1997Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PFL] (1), TC External Storage [Call number: 005.8 PFL] (1).
Building a global information assurance program / Raymond J. Curts, Douglas E. Campbell.

by Curts, Raymond J [author.] | Campbell, Douglas E, 1954- [author.].

Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, 2017Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CUR 2017] (2).