Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
658.478 Bro/Sec : A security evaluation criteria for baseline security standards / W.J. Brooks and M.J. Warren     
      A security evaluation criteria for baseline security standards / W.J. Brooks and M.J. Warren WATERFT ADPML  Book 2001
658.478 Bro/Sio : The security implications of electronic commerce / W. Brooks and M.J. Warren     
      The security implications of electronic commerce / W. Brooks and M.J. Warren WATERFT ADPML  Book 2001
658.478 Byr/Sbi : Securing business information : strategies to protect the enterprise and its network / F. Christian Byrnes, Dale Kutnick     
      Securing business information : strategies to protect the enterprise and its network / F. Christian Byrnes, Dale Kutnick WATERFT  Book 2002
658.478 Cal/Igd : IT governance : data security and BS 7799/ISO 17799 : a manager's guide to effective information security / Alan Calder, Steve Watkins     
      IT governance : data security and BS 7799/ISO 17799 : a manager's guide to effective information security / Alan Calder, Steve Watkins WATERFT  Book 2002
658.478 Cam/Ect : Electronic commerce : the new business platform for the Internet / Debra Cameron     
      Electronic commerce : the new business platform for the Internet / Debra Cameron MELB  Book 1997
658.478 Cam/Eoi : Economics of information security / edited by L. Jean Camp, Stephen Lewis     
      Economics of information security / edited by L. Jean Camp, Stephen Lewis W'PONDS  Book 2004
658.478 Cia/Saa : Security awareness : applying practical security in your world / Mark Ciampa     
      Security awareness : applying practical security in your world / Mark Ciampa MELB  Book 2010
658.478 Cia/Saa 2007 : Security awareness : applying practical security in your world / Mark Ciampa     
      Security awareness : applying practical security in your world / Mark Ciampa MELB  Book 2007
658.478 Cia/Saa 2017    
      Security awareness : applying practical security in your world / Mark Ciampa MELB, W'PONDS   Book 2017
      Security awareness : applying practical security in your world / Mark Ciampa MELB, W'PONDS   Book 2017
      Security awareness : applying practical security in your world / Mark Ciampa MELB, W'PONDS   Book 2017
      Security awareness : applying practical security in your world / Mark Ciampa MELB, W'PONDS   Book 2017
8 additional entries    
658.478 Cpa/Itg : IT governance : a practical guide for company directors and business executives / CPA Australia     
      IT governance : a practical guide for company directors and business executives / CPA Australia MELB  Book 2005
658.478 Dav/Iau : IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller, Kevin Wheeler     
      IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller, Kevin Wheeler MELB  Book 2007
658.478 Doj/Ews : E-security within small businesses / S. Dojkovski and M.J. Warren     
      E-security within small businesses / S. Dojkovski and M.J. Warren WATERFT ADPML  Book 2003
658.478 Doj/Sou    
      Security outsourcing / S. Dojkovski and M.J. Warren MELB, WATERFT ADPML   Book 2003
      Security outsourcing / S. Dojkovski and M.J. Warren MELB, WATERFT ADPML   Book 2003
658.478 Ega/Egt    
      The executive guide to information security : threats, challenges, and solutions / Mark Egan ; with Tim Mather MELB, WATERFT   Book 2005
      The executive guide to information security : threats, challenges, and solutions / Mark Egan ; with Tim Mather MELB, WATERFT   Book 2005
658.478 Erb/Gtd : Guide to disaster recovery / Michael Erbschloe     
      Guide to disaster recovery / Michael Erbschloe WATERFT  Book 2003
658.478 Fit/Cis    
      CISO leadership : essential principles for success / edited by Todd Fitzgerald, Micki Krause MELB, W'PONDS   Book 2008
      CISO leadership : essential principles for success / edited by Todd Fitzgerald, Micki Krause MELB, W'PONDS   Book 2008
658.478 For/Ppi    
      Preserving privacy in data outsourcing / Sara Foresti ; foreword by Pierangela Samarati MELB, WATERFT   Book 2011
      Preserving privacy in data outsourcing / Sara Foresti ; foreword by Pierangela Samarati MELB, WATERFT   Book 2011
658.478 For/Vma    
      Vulnerability management / Park Foreman MELB, WATERFT   Book 2010
      Vulnerability management / Park Foreman MELB, WATERFT   Book 2010
658.478 Gho/Ecs : E-commerce security : weak links, best defenses / Anup K. Ghosh     
      E-commerce security : weak links, best defenses / Anup K. Ghosh MELB  Book 1998
658.478 Gho/Gub : Guarding your business : a management approach to security / edited by Sumit Ghosh, Manu Malek and Edward A. Stohr     
      Guarding your business : a management approach to security / edited by Sumit Ghosh, Manu Malek and Edward A. Stohr W'PONDS  Book 2004
658.478 Gor/Mcr : Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb     
      Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb MELB  Book 2006
658.478 Gra/Uds : Understanding digital signatures : establishing trust over the Internet and other networks / Gail L. Grant     
      Understanding digital signatures : establishing trust over the Internet and other networks / Gail L. Grant W'BOOL  Book 1998
658.478 Gre/Csf : Computer security for the home and small office / Thomas C. Greene     
      Computer security for the home and small office / Thomas C. Greene W'PONDS  Book 2004
658.478 Gup/Har : Handbook of research on social and organizational liabilities in information security / [edited by] Manish Gupta, Raj Sharman     
      Handbook of research on social and organizational liabilities in information security / [edited by] Manish Gupta, Raj Sharman MELB  Book 2009
658.478 Her/Mai : Managing an information security and privacy awareness and training program / Rebecca Herold     
      Managing an information security and privacy awareness and training program / Rebecca Herold MELB  Book 2005
658.478 Hum/Gtt : Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 / Ted Humphreys and Angelika Plate     
      Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 / Ted Humphreys and Angelika Plate WATERFT  Book 2005
658.478 Hun/Cco    
      Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff MELB, WATERFT   Book 2004
      Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff MELB, WATERFT   Book 2004
658.478 Hut/Ast : The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson     
      The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson W'PONDS THESES  Book 2005
658.478 Int/Its : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information     
      Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information WATERFT  Book 2008
658.478 Int/Its 2011 : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information     
      Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information WATERFT  Book 2011
658.478 Jah/Hoe    
      Handbook of electronic security and digital forensics / edited by Hamid Jahankhani ... [and others] MELB  Book 2010
      Handbook of electronic security and digital forensics / edited by Hamid Jahankhani ... [and others] MELB  Book 2010
658.478 Jon/Rmf    
      Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden W'BOOL, WATERFT   Book 2005
      Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden W'BOOL, WATERFT   Book 2005
658.478 Ker/Dbs : Digital business security development : management technologies / Don Kerr, John G. Gammack, Kay Bryant, [editors]     
      Digital business security development : management technologies / Don Kerr, John G. Gammack, Kay Bryant, [editors] W'PONDS  Book 2011
658.478 Kho/Ecs    
      E-commerce security : advice from experts / [edited by] Mehdi Khosrow-Pour MELB, W'PONDS   Book 2004
      E-commerce security : advice from experts / [edited by] Mehdi Khosrow-Pour MELB, W'PONDS   Book 2004
658.478 Kou/Ais : Advances in security and payment methods for mobile commerce / Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors     
      Advances in security and payment methods for mobile commerce / Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors MELB  Book 2005
658.478 Kra/Hoi : Handbook of information security management / Micki Krause, Harold F. Tipton, editors     
      Handbook of information security management / Micki Krause, Harold F. Tipton, editors WATERFT  Book 1998
658.478 Lam/Etf : Enhancements to fraud and deception prevention in open multi-agent marketplaces / by Yuk Hei Lam     
      Enhancements to fraud and deception prevention in open multi-agent marketplaces / by Yuk Hei Lam W'PONDS THESES  Book 2006
658.478 Lay/Isd    
      Information security : design, implementation, measurement, and compliance / Timothy P. Layton MELB, WATERFT   Book 2006
      Information security : design, implementation, measurement, and compliance / Timothy P. Layton MELB, WATERFT   Book 2006
658.478 Mer/Epi : The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt     
      The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt WATERFT  CD-ROM 2002
658.478 Mil/Cfd : Compliance for dummies : Sophos special edition / by Lawrence C. Miller     
      Compliance for dummies : Sophos special edition / by Lawrence C. Miller MELB  Book 2010
658.478 Nem/Tap : Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati     
      Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati MELB  Book 2009
658.478 Ngo/Fia : Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou     
      Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou WATERFT ADPML  Book 2005
658.478 Ngo/Rdo    
      Recent developments of human factors and approaches of information security / Leanne Ngo, Wanlei Zhou and Matt Warren MELB, WATERFT ADPML   Book 2005
      Recent developments of human factors and approaches of information security / Leanne Ngo, Wanlei Zhou and Matt Warren MELB, WATERFT ADPML   Book 2005
658.478 Par/Fcc    
      Fighting computer crime : a new framework for protecting information / Donn B. Parker MELB, W'PONDS   Book 1998
      Fighting computer crime : a new framework for protecting information / Donn B. Parker MELB, W'PONDS   Book 1998
658.478 Par/Its : IT security management : IT securiteers - setting up an IT security function / Alberto Partida, Diego Andina     
      IT security management : IT securiteers - setting up an IT security function / Alberto Partida, Diego Andina MELB  Book 2010
658.478 Pat/Mst : Mapping security : the corporate security sourcebook for today's global economy / Tom Patterson with Scott Gleeson Blue     
      Mapping security : the corporate security sourcebook for today's global economy / Tom Patterson with Scott Gleeson Blue W'PONDS  Book 2005
658.478 Pau/Seb    
      Securing electronic business processes : highlights of the Information Security Solutions Europe 2003 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors] MELB  Book 2004
      Securing electronic business processes : highlights of the Information Security Solutions Europe 2004 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors] W'PONDS  Book 2004
658.478 Pur/Mis : A practical guide to managing information security / Steve Purser     
      A practical guide to managing information security / Steve Purser MELB  Book 2004
658.478 Pye/Doi : Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren     
      Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren WATERFT ADPML  Book 2003
658.478 Rav/Rca : Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia     
      Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia MELB  Book 2007
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next