Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-34 of 34)
Business -- Data processing -- Security measures
2
E-book
2019

99 Privacy Breaches to Beware Of


Shepherdson, Kevin



Rating:

 
3
E-book
2023

An action plan for cyber resilience : it's impossible to avoid all cyber risk. Here's how to make your company more resilient in the face of new threats


Coden, Michael, author
[First edition]
[Cambridge, Massachusetts] : MIT Sloan Management Review, 2023

Rating:

 
13
Location Call no. Vol. Availability
 MELB  005.8 Cal/Bgt  AVAILABLE
15
E-book
2005

Certification and security in inter-organizational E-services : IFIP TC-11 second International Workshop on Certification and Security in Inter-Organizational E-Services (CSES), World Computer Congres


IFIP TC-11 International Workshop on Certification and Security in Inter-Organizational E-Services (2nd : 2004 : Toulouse, France)



Rating:

 
16
E-book
2016

The CISO Handbook


Gentile, Michael, author
1st edition
Auerbach Publications, 2016

Rating:

 
18
E-book
2017

The cyber risk handbook : creating and measuring effective cybersecurity capabilities


Antonucci, Domenic, author.

Hoboken, New Jersey : John Wiley and Sons, Inc., 2017

Rating:

 
21
E-book
2020

Data breaches : crisis and opportunity


Davidoff, Sherri, author.

Boston : Addison-Wesley, [2020]

Rating:

 
22
E-book
2008

Deployment guide series.


Bücker, Axel



Rating:

 
24
E-book
2018

IBM Spectrum Scale functionality to support GDPR requirements


Patil, Sandeep, 1986- author.

[Place of publication not identified] : IBM Corporation, International Technical Support Organization, [2018]

Rating:

 
25
E-book
2015

Information security : a practical guide : bridging the gap between IT and management


Mooney, Tom, author

Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015

Rating:

 
26
Book
2006

Information security : design, implementation, measurement, and compliance


Layton, Timothy P.

Boca Raton : Auerbach Publications, 2006

Rating:

Request It 
 
Location Call no. Vol. Availability
 WATERFT BUSINESS  658.478 Lay/Isd  AVAILABLE
 MELB  658.478 Lay/Isd  AVAILABLE
28
E-book
2016

Information security policies, procedures, and standards : a practitioner's reference


Landoll, Douglas J., author.

Boca Raton, FL : CRC Press, 2016

Rating:

 
31
Book
2006

Managing cybersecurity resources : a cost-benefit analysis


Gordon, Lawrence A.

New York : McGraw-Hill, [2006]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.478 Gor/Mcr  AVAILABLE
34
Book
2008

The new school of information security


Shostack, Adam.

Upper Saddle River, NJ : Addison-Wesley, [2008]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.478 Sho/Nso  AVAILABLE
Add Marked to Bag Add All On Page
Locate in results