Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 C348 2004eb | Privacy protection and computer forensics / | 1 |
QA76.9.A25 C35 2008eb | Ten rules of information security for the smaller business : a plain English guide / | 1 |
QA76.9.A25 C35 2015eb | PCI DSS : a pocket guide / | 1 |
QA76.9.A25 .C35 2018ebd | ISO27001/ISO27002 : a Pocket Guide / | 1 |
QA76.9.A25 C35 2020 |
IT governance : an international guide to data security and ISO27001/ISO 27002 / The cyber security handbook prepare for, respond to and recover from cyber attacks / |
2 |
QA76.9.A25 C353 2005 | The case for ISO 27001 / | 2 |
QA76.9.A25 C353 2013eb | The case for ISO27001-2013, second edition / | 1 |
QA76.9.A25 .C353 2014eb | Cyber essentials : a pocket guide / | 1 |
QA76.9.A25 .C353 2017 |
ISO27001/ISO27002 : un guide de poche / ISO27001/ISO27002 : Ein Taschenführer / |
2 |
QA76.9.A25 C353 2020 | Cyber Security: Essential principles to secure your organisation | 1 |
QA76.9.A25 C36 2012 |
The economics of financial and medical identity theft Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings / |
2 |
QA76.9.A25 C368 2019 |
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity / How to manage cybersecurity risk : a security leader's roadmap with Open FAIR / |
4 |
QA76.9.A25 C369 2005 | File system forensic analysis / | 1 |
QA76.9.A25 C37 2019eb |
Tribe of hackers : cybersecurity advice from the best hackers in the world / Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors / |
5 |
QA76.9.A25 C37 2020 |
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership / Tribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership. |
3 |
QA76.9.A25 C37 2021 | Start-up secure : baking cybersecurity into your company from founding to exit / | 1 |
QA76.9.A25 C37 2022 | The security culture playbook : an executive guide to reducing risk and developing your human defense layer / | 2 |
QA76.9.A25 C37 2023 | Tactical Wireshark : a deep dive into intrusion analysis, malware incidents, and extraction of forensic evidence / | 2 |
QA76.9.A25.C373 2016 | Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition. | 1 |
QA76.9.A25 C378 2021 | Start-Up Secure Baking Cybersecurity into Your Company from Founding to Exit. | 1 |