658.478 Bro/Sec : A security evaluation criteria for baseline security standards / W.J. Brooks and M.J. Warren
A security evaluation criteria for baseline security standards / W.J. Brooks and M.J. Warren
WATERFT ADPML
2001
658.478 Bro/Sio : The security implications of electronic commerce / W. Brooks and M.J. Warren
The security implications of electronic commerce / W. Brooks and M.J. Warren
WATERFT ADPML
2001
658.478 Byr/Sbi : Securing business information : strategies to protect the enterprise and its network / F. Christian Byrnes, Dale Kutnick
Securing business information : strategies to protect the enterprise and its network / F. Christian Byrnes, Dale Kutnick
WATERFT
2002
658.478 Cal/Igd : IT governance : data security and BS 7799/ISO 17799 : a manager's guide to effective information security / Alan Calder, Steve Watkins
IT governance : data security and BS 7799/ISO 17799 : a manager's guide to effective information security / Alan Calder, Steve Watkins
WATERFT
2002
658.478 Cam/Ect : Electronic commerce : the new business platform for the Internet / Debra Cameron
Electronic commerce : the new business platform for the Internet / Debra Cameron
MELB
1997
658.478 Cam/Eoi : Economics of information security / edited by L. Jean Camp, Stephen Lewis
Economics of information security / edited by L. Jean Camp, Stephen Lewis
W'PONDS
2004
658.478 Cia/Saa : Security awareness : applying practical security in your world / Mark Ciampa
Security awareness : applying practical security in your world / Mark Ciampa
MELB
2010
658.478 Cia/Saa 2007 : Security awareness : applying practical security in your world / Mark Ciampa
Security awareness : applying practical security in your world / Mark Ciampa
MELB
Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff
MELB, WATERFT
2004
Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff
MELB, WATERFT
2004
658.478 Hut/Ast : The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson
The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson
W'PONDS THESES
2005
658.478 Int/Its : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
WATERFT
2008
658.478 Int/Its 2011 : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
WATERFT
Information security : design, implementation, measurement, and compliance / Timothy P. Layton
MELB, WATERFT
2006
Information security : design, implementation, measurement, and compliance / Timothy P. Layton
MELB, WATERFT
2006
658.478 Mer/Epi : The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt
The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt
WATERFT
2002
658.478 Mil/Cfd : Compliance for dummies : Sophos special edition / by Lawrence C. Miller
Compliance for dummies : Sophos special edition / by Lawrence C. Miller
MELB
2010
658.478 Nem/Tap : Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
MELB
2009
658.478 Ngo/Fia : Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou
Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou
WATERFT ADPML
Securing electronic business processes : highlights of the Information Security Solutions Europe 2003 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors]
MELB
2004
Securing electronic business processes : highlights of the Information Security Solutions Europe 2004 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors]
W'PONDS
2004
658.478 Pur/Mis : A practical guide to managing information security / Steve Purser
A practical guide to managing information security / Steve Purser
MELB
2004
658.478 Pye/Doi : Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren
Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren
WATERFT ADPML
2003
658.478 Rav/Rca : Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia
Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia
MELB