Your search returned 40 results.

1.
Information security : risk management : management systems / Cesare Gallotti, Massimo Cottafavi and Stefano Ramacciotti

by Gallotti, Cesare | Cottafavi, Massimo | Ramacciotti, Stefano.

Edition: 2022 ed.Publication details: Monee, IL Cesare Gallotti 2022Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Gal (1).
Lists:

2.
Cybersecurity fundamentals : best security practices / Bruce Brown

by Brown, Bruce.

Publication details: Monee, IL Bruce Brown 2022Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Bro (1).

3.
Anomaly detection as a service : challenges, advances, and opportunities / Danfeng Yao ... [et al.]

by Yao, Danfeng | ProQuest LibCentral | Shu, Xiaokui | Cheng, Long | Stolfo, Salvatore J.

Series: Synthesis Lectures on Information Security, Privacy, and Trust SeriesPublication details: Switzerland Springer International Publishing AG 2022Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76 Yao (1).
Lists:

4.
Computer security : art and science / Matt Bishop, Elisabeth Sullivan, Michelle Ruppel

by Bishop, Matt | Sullivan, Elisabeth | Ruppel, Michelle | EMO.

Edition: 2nd ed.Publication details: Addison-Wesley 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Bis (1).

5.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals / Bart R. McDonough

by McDonough, Bart R | BC.

Publication details: John Wiley & Sons, Inc. 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Mac (1).

6.
(A) data-driven computer defense : a way to improve any computer defense / Roger A. Grimes

by Grimes, Roger A | BC.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Gri (1).

7.
Security risk management : building an information security risk management program from the ground up / Evan Wheeler

by Wheeler, Evan.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: TK 5105.59 Whe (1).

8.
(The) basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress

by Andress, Jason.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25And (2).

9.
Corporate computer security / Randall J. Boyle, Raymond R. Panko

by Boyle, Randall J | Panko, Raymond R.

Edition: 4th global ed.Publication details: Pearson Education 2015Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 A25Boy (1), FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Boy (2).

10.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco

by DeFranco, Joanna F.

Publication details: CRC Press 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Def (1).

11.
Computer network security and cyber ethics / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: 4th ed.Publication details: McFarland 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Kiz (2).

12.
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 / Barry L. Williams

by Williams, Barry L.

Publication details: CRC Press 2013Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Wil (1). Checked out (1).

13.
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terence V. Lillard ... [et al.]

by Lillard, Terence V.

Publication details: Elsevier/Syngress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Dig (2).

14.
Computer network security and cyber ethics / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: 3rd ed.Publication details: McFarland 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Kiz (3).

15.
IT audit, control, and security / Robert Moeller

by Moeller, Robert.

Publication details: J. Wiley 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: T58.5 Moe (1), ELM LIBRARY (ELM)Call number: T58.5 Moe (1).

16.
Information security risk analysis / Thomas R. Peltier

by Peltier, Thomas R | Casey, Eoghan | Altheide, Cory.

Edition: 3rd ed.Publication details: CRC Press 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Pel (1).

17.
Managing information security / John R. Vacca, editor

by Vacca, John R.

Publication details: Syngress 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Man (1).

18.
Cloud security and privacy / Tim Mather, Subra Kumaraswamy, and Shahed Latif

by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed.

Publication details: O'Reilly 2009Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Mat (1).

19.
Computer and information security handbook / edited by John R. Vacca

by Vacca, John R.

Publication details: Elsevier/M. Kaufmann 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Com (1).

20.
Management of information security / Michael Whitman, Herbert Mattord

by Whitman, Michael | Mattord, Herbert.

Edition: 3rd ed.Publication details: Course Technology Cengage Learning 2010Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.9 A25Whi (1). Damaged (1).

Copyright © 2024 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha