|
|
21. |
|
Enterprise information security and privacy
Publication:
Boston : Artech House, 2009
. 1 online resource (xxiv, 231 p.) :
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
22. |
|
Application Security in the ISO27001 Environment.
by Vinod, Vasudevan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (220 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
23. |
|
ISO27001 in a Windows environment
by Honan, Brian.
Publication:
Ely, UK : IT Governance, 2010
. 1 online resource.
, Title from title screen. | First ed. published as: Implementing ISO27001 in a Windows environment : the best practice implementation handbook for a Microsoft Windows environment.
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
24. |
|
Information security law
by Smedinghoff, Thomas J.,
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (182 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
25. |
|
Managing Information Security Breaches
by Krausz, Michael.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (184 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
26. |
|
Nine steps to success
by Calder, Alan,
Publication:
Ely, U.K. : IT Governance Pub., 2005
. 1 online resource (82 p.)
, Title from home page (viewed Jan. 4, 2011).
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
27. |
|
PCI DSS
by Wright, Steve,
Publication:
Ely, UK : IT Governance, 2009
. 1 online resource.
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
28. |
|
The Data Governance Imperative
by Sarsfield, Steve.
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (161 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
29. |
|
An Introduction to Information Security and ISO 27001.
by Watkins, Steve G.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (46 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
30. |
|
Data Protection Compliance in the UK
by Jay, Rosemary.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (54 pages)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
31. |
|
Data Protection vs Freedom of Information
by Ticher, Paul.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (67 pages)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
32. |
|
E-Discovery and the Federal Rules of Civil Procedure
by Schaufenbuel, Bradley.
Publication:
Ely : IT Governance Pub., 2007
. 1 online resource (62 p.)
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
33. |
|
How to survive a data breach
by Mitchell, Stewart.
Publication:
Ely, U.K. : IT Governance Pub., 2009
. 1 online resource (44 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
34. |
|
Information Security Breaches
by Krausz, Michael,
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (56 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
35. |
|
ISO27001 Assessments Without Tears
by Watkins, Steve.
Publication:
Ely : IT Governance Pub., 2007
. 1 online resource (22 p.)
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
36. |
|
ISO27001/ISO27002
by Calder, Alan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (74 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
37. |
|
Managing information risk
by Mitchell, Stewart.
Publication:
Ely, UK : IT Governance Pub., 2009
. 1 online resource (57 p.)
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
38. |
|
PCI DSS
by Calder, Alan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (45 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
39. |
|
Risk Assessment for Asset Owners
by Calder, Alan.
Publication:
Ely : IT Governance Pub., 2007
. 1 online resource (46 p.)
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
40. |
|
The insider threat
by Blackwell, Clive.
Publication:
Norwood Mass. : Books24x7.com, 2005
. 1 online resource.
, Title from title screen.
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|