Call Number (LC) Title Results
HF5548.37 .G462 2009 CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives / 1
HF5548.37 .G67 2006 Managing cybersecurity resources : a cost-benefit analysis / 1
HF5548.37 .G69 2022 Cyber Security, 2nd Edition / 1
HF5548.37 .G737 2016 Cyber security an introduction for non-technical managers / 1
HF5548.37 .G74 2008 IT disaster recovery planning for dummies / 1
HF5548.37 .H33 2001b QA76.9.A25 H334 2001eb Hack proofing your e-commerce site. 1
HF5548.37 .H5 2000eb A primer for disaster recovery planning in an IT environment / 1
HF5548.37 .H63 2021 Facebook battles Apple over user privacy / 1
HF5548.37 .H66 2014eb ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment / 1
HF5548.37 I39 2004eb Information security management, education and privacy IFIP 18th World Computer Congress : TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France / 1
HF5548.37 -- I94 2010eb Information Security for Management. 1
HF5548.37 .K38 2014eb Responsive security : be ready to be secure / 1
HF5548.37 .K57 2022 Optimal spending on cybersecurity measures : risk management / 1
HF5548.37 .K64 2017 Understanding Cyber Risk : Protecting Your Corporate Assets. 1
HF5548.37 .K64 2018 Understanding cyber risk : protecting your corporate assets / 1
HF5548.37 .K68 2010 Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams / 1
HF5548.37 .L33 2009eb Managing the human factor in information security : how to win over staff and influence business managers / 1
HF5548.37 .L33 2012 Data governance : how to design, deploy and sustain an effective data governance program / 4
HF5548.37 .L3577 2016 Information security policies, procedures, and standards : a practitioner's reference / 3
HF5548.37 .L358 2006 The security risk assessment handbook : a complete guide for performing security risk assessments / 1