Your search returned 57 results.

1.
Information security : risk management : management systems / Cesare Gallotti, Massimo Cottafavi and Stefano Ramacciotti

by Gallotti, Cesare | Cottafavi, Massimo | Ramacciotti, Stefano.

Edition: 2022 ed.Publication details: Monee, IL Cesare Gallotti 2022Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Gal (1).
Lists:

2.
Managing risk in information systems / Darril Gibson, Andy Igonor

by Gibson, Darril | Igonor, Andy | EMO.

Edition: 3rd ed.Publication details: Jones & Bartlett Learning 2022Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 Gib (1).

3.
(The) security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll

by Landoll, Douglas J | EMO.

Edition: 3rd ed.Publication details: CRC Press 2021Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Lan (1).

4.
Introductory computer forensics : a hands-on practical approach / Xiaodong Lin

by Lin, Xiaodong | Springer (Obtain eBook from Library counter).

Publication details: Springer 2018Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Lin (1).

5.
Understanding cryptography : a textbook for students and practitioners / Christof Paar, Jan Pelzl

by Paar, Christof | Pelzl, Jan | Springer (Obtain eBook from Library counter).

Publication details: Springer 2010Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Paa (1).

6.
Multimedia big data computing for IoT applications : concepts, paradigms and solutions / Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, editors

by Tanwar, Sudeep | Tyagi, Sudhanshu | Kumar, Neeraj | Springer (Obtain eBook from Library counter).

Publication details: Springer 2020Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: Q 342 Mul (1).

7.
Computer and internet security : a hands-on approach / Wenliang Du

by Du,Wenliang | EMO.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Duw (1).

8.
Computer security : art and science / Matt Bishop, Elisabeth Sullivan, Michelle Ruppel

by Bishop, Matt | Sullivan, Elisabeth | Ruppel, Michelle | EMO.

Edition: 2nd ed.Publication details: Addison-Wesley 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Bis (1).

9.
Future crimes : inside the digital underground and the battle for our connected world / Marc Goodman

by Goodman, Marc | BC.

Publication details: Anchor Books 2016Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Goo (1).

10.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals / Bart R. McDonough

by McDonough, Bart R | BC.

Publication details: John Wiley & Sons, Inc. 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Mac (1).

11.
(A) data-driven computer defense : a way to improve any computer defense / Roger A. Grimes

by Grimes, Roger A | BC.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Gri (1).

12.
Cognitive hack : the new battleground in cybersecurity... the human mind / James Bone

by Bone, James.

Publication details: CRC Press 2017Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Bon (1).

13.
(The) basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress

by Andress, Jason.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25And (2).

14.
Corporate computer security / Randall J. Boyle, Raymond R. Panko

by Boyle, Randall J | Panko, Raymond R.

Edition: 4th global ed.Publication details: Pearson Education 2015Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 A25Boy (1), FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Boy (2).

15.
Computer forensics : InfoSec Pro guide / David Cowen

by Cowen, David.

Publication details: McGraw-Hill Education 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 8079 C65Cow (1), HELP UNIVERSITY (HU)Call number: HV 8079 C65Cow (1).

16.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco

by DeFranco, Joanna F.

Publication details: CRC Press 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Def (1).

17.
Principles of information security / Michael E. Whitman, Herbert J. Mattord

by Whitman, Michael E | Mattord, Herbert J.

Edition: 4th ed.Publication details: Course Technology Cengage Learning 2012Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Whi (2).

18.
Fundamentals of communications and networking / Michael G. Solomon, David Kim, and Jeffrey L. Carrell

by Solomon, Michael G | Kim, David | Carrell, Jeffrey L.

Edition: 2nd ed.Publication details: Jones & Bartlett Learning 2015Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Sol (2).

19.
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 / Barry L. Williams

by Williams, Barry L.

Publication details: CRC Press 2013Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Wil (1). Checked out (1).

20.
iOS forensic analysis for iPhone, iPad and iPod touch / Sean Morrissey

by Morrissey, Sean.

Publication details: Apress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV 6773 Mor (2).

Copyright © 2024 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha