This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-12 of 12)
Data protection -- Handbooks, manuals, etc.
1
2010
Compliance for dummies : Sophos special edition
Miller, Lawrence.
Hoboken, N.J. : Wiley Publishing, 2010
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
658.478 Mil/Cfd
AVAILABLE
2
1982
Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems
Meyer, Carl H.
New York : Wiley, 1982
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
001.5436 Mey
AVAILABLE
3
2004
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
Wallace, Michael, 1960-
New York : American Management Association, [2004]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
658.477 Wal/Drh
AVAILABLE
4
2004
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
Wallace, Michael, 1960-
Rating:
Electronic Resources
More...
5
2018
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
Wallace, Michael, 1960- author.
Third edition
New York : American Management Association, [2018]
Rating:
Electronic Resources
6
2011
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
Wallace, Michael, 1960-
2nd ed
Rating:
Electronic Resources
7
1998
Handbook of information security management
Boca Raton : Auerbach, [1998]
Rating:
Request It
Location
Call no.
Vol.
Availability
WATERFT BUSINESS
658.478 Kra/Hoi
AVAILABLE
8
2016
IBM ProtecTIER implementation and best practices guide
Fourth edition
Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2016
Rating:
Electronic Resources
9
2014
IBM ProtecTIER implementation and best practices guide
3rd ed
Rating:
Electronic Resources
10
2015
Information assurance handbook : effective computer security and risk management strategies
Schou, Corey.
Rating:
Electronic Resources
11
2006
Information security management handbook
Fifth edition
Boca Raton, Fla. : Auerbach, 2004
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
658.0558 Tip/Ism 2003
AVAILABLE
12
2007
Information security management handbook
Sixth edition
Boca Raton : Auerbach Publications, [2007]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
658.0558 Tip/Ism 2007
AVAILABLE
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search