HF5548.37 .G462 2009
|
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives / |
1 |
HF5548.37 .G67 2006
|
Managing cybersecurity resources : a cost-benefit analysis / |
1 |
HF5548.37 .G69 2022
|
Cyber Security, 2nd Edition / |
1 |
HF5548.37 .G737 2016
|
Cyber security an introduction for non-technical managers / |
1 |
HF5548.37 .G74 2008
|
IT disaster recovery planning for dummies / |
1 |
HF5548.37 .H33 2001b QA76.9.A25 H334 2001eb
|
Hack proofing your e-commerce site. |
1 |
HF5548.37 .H5 2000eb
|
A primer for disaster recovery planning in an IT environment / |
1 |
HF5548.37 .H63 2021
|
Facebook battles Apple over user privacy / |
1 |
HF5548.37 .H66 2014eb
|
ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment / |
1 |
HF5548.37 I39 2004eb
|
Information security management, education and privacy IFIP 18th World Computer Congress : TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France / |
1 |
HF5548.37 -- I94 2010eb
|
Information Security for Management. |
1 |
HF5548.37 .K38 2014eb
|
Responsive security : be ready to be secure / |
1 |
HF5548.37 .K57 2022
|
Optimal spending on cybersecurity measures : risk management / |
1 |
HF5548.37 .K64 2017
|
Understanding Cyber Risk : Protecting Your Corporate Assets. |
1 |
HF5548.37 .K64 2018
|
Understanding cyber risk : protecting your corporate assets / |
1 |
HF5548.37 .K68 2010
|
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams / |
1 |
HF5548.37 .L33 2009eb
|
Managing the human factor in information security : how to win over staff and influence business managers / |
1 |
HF5548.37 .L33 2012
|
Data governance : how to design, deploy and sustain an effective data governance program / |
4 |
HF5548.37 .L3577 2016
|
Information security policies, procedures, and standards : a practitioner's reference / |
3 |
HF5548.37 .L358 2006
|
The security risk assessment handbook : a complete guide for performing security risk assessments / |
1 |