Call Number (LC) | Title | Results |
---|---|---|
HD30.37 .W43 1998eb | Web-weaving : intranets, extranets and strategic alliances / | 1 |
HD30.37 .Y564 2018 | Robotic Process Automation with Blue Prism Quick Start Guide : Create Software Robots and Automate Business Processes. | 1 |
HD30.38 |
Pragmatic security metrics applying metametrics to information security / Trust, privacy, and security in digital business : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016. Proceedings / The Vulnerability Researcher's Handbook A Comprehensive Guide to Discovering, Reporting, and Publishing Security Vulnerabilities / The complete guide to defense in depth learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach / Handbook of e-business security Cyber wars : hacks that shocked the business world / Security awareness for dummies / Information security and employee behaviour : how to reduce risk through employee education, training and awareness / Cracking security misconceptions : untangling common myths about modern information security / Managing cybersecurity risk : case studies and solutions / Toward effective cyber defense in accordance with the rules of law / Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare / Identity and data security for web development : best practices / Identity patterns and strategies for enterprise design enterprise cloud identity model with Oauth 2.0 and active directory / What a unicorn knows : how leading entrepreneurs use lean principles to drive sustainable growth / Trust, privacy, and security in digital business : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / Business transformation through blockchain. Pragmatic security metrics : applying metametrics to information security / Cloud identity patterns and strategies for enterprise / Trust, privacy and security in digital business : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / The cybersecurity playbook : how every leader and employee can contribute to a culture of security / Fundamentals of adopting the NIST cybersecurity framework / Trust, privacy and security in digital business : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / |
29 |
HD30.38 .A37 1997 | Secure commerce on the Internet / | 1 |
HD30.38 .A58 2017 |
The cyber risk handbook : creating and measuring effective cybersecurity capabilities / The cyber risk handbook creating and measuring effective cybersecurity capabilities / |
4 |
HD30.38 .C35 2016eb | Selling information security to the board : a primer / | 1 |
HD30.38 .C55 2022 | Cybersecurity for business : organization-wide strategies to ensure cyber risk is not just an IT issue / | 1 |
HD30.38 .D54 2016eb | ||
HD30.38 .E54 2003 | Engaging the board : corporate governance and information assurance / | 1 |
HD30.38 E96 2020 | The evolution of business in the cyber age : digital transformation, threats, and security / | 1 |
HD30.38 .H363 2023 | Handbook of research on cybersecurity risk in contemporary business systems / | 1 |
HD30.38 .I47 2011eb | Implementing an InfoSphere Optim data growth solution / | 1 |
HD30.38 .I53 2019eb | Industrial control systems security and resiliency : practice and theory / | 1 |
HD30.38 .J34 2022 | Corporate cybersecurity : identifying risks and the bug bounty program / | 2 |
HD30.38 .K46 2010eb | Cyber Risks for Business Professionals : a Management Guide. | 1 |
HD30.38 .M325 2002eb |
Guarding your business : a management approach to security / Guarding your business a management approach to security / |
2 |
HD30.38 .M327 2009 | Managing information risk and the economics of security | 1 |
HD30.38 .M37 2021 | CyRM mastering the management of cybersecurity / | 1 |
HD30.38 .O94 1999 | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / | 1 |
HD30.38 .O94 1999eb | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / | 1 |