|
|
1601. |
|
Nine steps to success
by Calder, Alan,
Publication:
Ely, U.K. : IT Governance Pub., 2005
. 1 online resource (82 p.)
, Title from home page (viewed Jan. 4, 2011).
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1602. |
|
PCI DSS
by Wright, Steve,
Publication:
Ely, UK : IT Governance, 2009
. 1 online resource.
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1603. |
|
Security testing handbook for banking applications
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (191 p.) :
, Title from home page (viewed Sep. 30, 2010).
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1604. |
|
The definitive guide to the C & A transformation
by Mehan, Julie E.
Publication:
Ely, U.K. : IT Governance Pub., 2009
. 1 online resource.
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1605. |
|
An Introduction to Information Security and ISO 27001.
by Watkins, Steve G.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (46 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1606. |
|
Business continuity and BS25999
by Calder, Alan.
Publication:
Ely, U.K. : IT Governance Pub., 2008
. 1 online resource (127 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1607. |
|
Cloud Security and Governance
by Blount, Sumner.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (58 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1608. |
|
Computer forensics
by Clarke, Nathan.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (75 p.) :
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1609. |
|
E-mail Security
by Furnell, Steven.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (100 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1610. |
|
How to survive a data breach
by Mitchell, Stewart.
Publication:
Ely, U.K. : IT Governance Pub., 2009
. 1 online resource (44 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1611. |
|
How to use Web 2.0 and social networking sites securely
Publication:
Ely, UK : IT Governance Pub., 2009
. 1 online resource.
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1612. |
|
Information Security Breaches
by Krausz, Michael,
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (56 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1613. |
|
ISO27000 and information security
by Calder, Alan,
Publication:
Ely, U.K. : IT Governance Pub., 2010
. 1 online resource.
, Title from title screen.
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1614. |
|
ISO27001/ISO27002
by Calder, Alan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (74 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1615. |
|
IT Governance to Drive High Performance
by Kress, Robert E.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (47 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1616. |
|
IT induction and information security awareness
by Maddock, Valerie.
Publication:
Ely : IT Governance Publishing, 2010
. 1 online resource (xii, 42 p.) :
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1617. |
|
Managing information risk
by Mitchell, Stewart.
Publication:
Ely, UK : IT Governance Pub., 2009
. 1 online resource (57 p.)
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1618. |
|
Mobile Security
by Furnell, Steven.
Publication:
Ely : IT Governance Pub., 2009
. 1 online resource (77 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1619. |
|
PCI DSS
by Calder, Alan.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (45 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
1620. |
|
Security
by Kearney, Paul.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (60 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|