Your search returned 17 results.

1.
Computer security handbook / by R. A. Elbra.

by Elbra, R. A.

Publication details: NCC Blackwell 1992Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Elb. (1).

2.
Protection and security on the information superhighway / Frederick B. Cohen.

by Cohen, Frederick B.

Publication details: J. Wiley 1995Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Coh. (1).

3.
Internet security for business / Terry Bernstein..... [ et al. ].

by Bernstein, Terry.

Publication details: J. Wiley 1996Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.875 I75Int. (1).

6.
Investigator's guide to steganography / Gregory Kipper.

by Kipper, Gregory.

Publication details: Auerbach Publications 2004Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Kip. (1).

9.
Auditing cloud computing : a security and privacy guide / Ben Halpert

by Halpert, Ben.

Publication details: J. Wiley 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF5548.37 Aud (1).

10.
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 / Barry L. Williams

by Williams, Barry L.

Publication details: CRC Press 2013Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Wil (1). Checked out (1).

11.
Data governance : how to design, deploy, and sustain an effective data governance program / John Ladley

by Ladley, John.

Publication details: Elsevier/Morgan Kaufmann 2012Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: T 58.64 Lad (1).

12.
Cognitive hack : the new battleground in cybersecurity... the human mind / James Bone

by Bone, James.

Publication details: CRC Press 2017Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Bon (1).

13.
Future crimes : inside the digital underground and the battle for our connected world / Marc Goodman

by Goodman, Marc | BC.

Publication details: Anchor Books 2016Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Goo (1).

14.
Introductory computer forensics : a hands-on practical approach / Xiaodong Lin

by Lin, Xiaodong | Springer (Obtain eBook from Library counter).

Publication details: Springer 2018Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Lin (1).

15.
Foong's Malaysia cyber, electronic evidence and information technology law / Foong Cheng Leong

by Foong, Cheng Leong | EMO.

Publication details: Thomson Reuters Asia Sdn Bhd. 2020Availability: Items available for loan: ELM LIBRARY (ELM)Call number: KF 5935 Foo (1).

16.
(The) security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll

by Landoll, Douglas J | EMO.

Edition: 3rd ed.Publication details: CRC Press 2021Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Lan (1).

17.
Data governance : the definitive guide : people, processes, and tools to operationalize data trustworthiness / Evren Eryurek ... [et al.]

by Eryurek, Evren.

Publication details: Boston, MA O'Reilly Media, Inc. 2021Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: HF 5548.37 Dat (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha