|
|
521. |
|
Les partis g�en�erationnels au Qu�ebec
by Lemieux, Vincent,
Publication:
[Qu�ebec, Qu�e.] : Presses de l'Universit�e Laval, 2011
. 1 online resource (1 texte �electronique (xii, 113 p.)) :
Date:2011
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
522. |
|
Application Security in the ISO27001 Environment.
by Vinod, Vasudevan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (220 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
523. |
|
Assessing information security
by Vladimirov, Andrew A.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (405 p.) :
, Title from home page (viewed Jan. 4, 2011).
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
524. |
|
Cyber Risks for Business Professionals
by Kendrick, Rupert.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (305 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
525. |
|
CyberWar, CyberTerror, CyberCrime.
by Mehan, Julie E.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (281 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
526. |
|
ISO27001 in a Windows environment
by Honan, Brian.
Publication:
Ely, UK : IT Governance, 2010
. 1 online resource.
, Title from title screen. | First ed. published as: Implementing ISO27001 in a Windows environment : the best practice implementation handbook for a Microsoft Windows environment.
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
527. |
|
Information security law
by Smedinghoff, Thomas J.,
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (182 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
528. |
|
Information security risk management for ISO27001/ISO27002
by Calder, Alan,
Publication:
Cambridgeshire : IT Governance Pub., 2010
. 1 online resource (186 p.) :
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
529. |
|
Managing Information Security Breaches
by Krausz, Michael.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (184 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
530. |
|
Nine steps to success
by Calder, Alan,
Publication:
Ely, U.K. : IT Governance Pub., 2005
. 1 online resource (82 p.)
, Title from home page (viewed Jan. 4, 2011).
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
531. |
|
Security testing handbook for banking applications
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (191 p.) :
, Title from home page (viewed Sep. 30, 2010).
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
532. |
|
The definitive guide to the C & A transformation
by Mehan, Julie E.
Publication:
Ely, U.K. : IT Governance Pub., 2009
. 1 online resource.
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
533. |
|
An Introduction to Information Security and ISO 27001.
by Watkins, Steve G.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (46 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
534. |
|
Cloud Security and Governance
by Blount, Sumner.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (58 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
535. |
|
Computer forensics
by Clarke, Nathan.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (75 p.) :
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
536. |
|
E-mail Security
by Furnell, Steven.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (100 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
537. |
|
How to survive a data breach
by Mitchell, Stewart.
Publication:
Ely, U.K. : IT Governance Pub., 2009
. 1 online resource (44 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
538. |
|
Information Security Breaches
by Krausz, Michael,
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (56 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
539. |
|
ISO27000 and information security
by Calder, Alan,
Publication:
Ely, U.K. : IT Governance Pub., 2010
. 1 online resource.
, Title from title screen.
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
540. |
|
ISO27001/ISO27002
by Calder, Alan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (74 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|