1601. Nine steps to success by Calder, Alan, Publication: Ely, U.K. : IT Governance Pub., 2005 . 1 online resource (82 p.) , Title from home page (viewed Jan. 4, 2011). Date:2005 Availability: No items available: Actions: Add to cart
1602. PCI DSS by Wright, Steve, Publication: Ely, UK : IT Governance, 2009 . 1 online resource. , Title from title screen. Date:2009 Availability: No items available: Actions: Add to cart
1603. Security testing handbook for banking applications   Publication: Ely : IT Governance Pub., 2009 . 1 online resource (191 p.) : , Title from home page (viewed Sep. 30, 2010). Date:2009 Availability: No items available: Actions: Add to cart
1604. The definitive guide to the C & A transformation by Mehan, Julie E. Publication: Ely, U.K. : IT Governance Pub., 2009 . 1 online resource. , Title from title screen. Date:2009 Availability: No items available: Actions: Add to cart
1605. An Introduction to Information Security and ISO 27001. by Watkins, Steve G. Publication: Ely : IT Governance Pub., 2008 . 1 online resource (46 p.) Date:2008 Availability: No items available: Actions: Add to cart
1606. Business continuity and BS25999 by Calder, Alan. Publication: Ely, U.K. : IT Governance Pub., 2008 . 1 online resource (127 p.) Date:2008 Availability: No items available: Actions: Add to cart
1607. Cloud Security and Governance by Blount, Sumner. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (58 p.) Date:2010 Availability: No items available: Actions: Add to cart
1608. Computer forensics by Clarke, Nathan. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (75 p.) : Date:2010 Availability: No items available: Actions: Add to cart
1609. E-mail Security by Furnell, Steven. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (100 p.) Date:2010 Availability: No items available: Actions: Add to cart
1610. How to survive a data breach by Mitchell, Stewart. Publication: Ely, U.K. : IT Governance Pub., 2009 . 1 online resource (44 p.) Date:2009 Availability: No items available: Actions: Add to cart
1611. How to use Web 2.0 and social networking sites securely   Publication: Ely, UK : IT Governance Pub., 2009 . 1 online resource. , Title from title screen. Date:2009 Availability: No items available: Actions: Add to cart
1612. Information Security Breaches by Krausz, Michael, Publication: Ely : IT Governance Pub., 2009 . 1 online resource (56 p.) Date:2009 Availability: No items available: Actions: Add to cart
1613. ISO27000 and information security by Calder, Alan, Publication: Ely, U.K. : IT Governance Pub., 2010 . 1 online resource. , Title from title screen. Date:2010 Availability: No items available: Actions: Add to cart
1614. ISO27001/ISO27002 by Calder, Alan. Publication: Ely : IT Governance Pub., 2008 . 1 online resource (74 p.) Date:2008 Availability: No items available: Actions: Add to cart
1615. IT Governance to Drive High Performance by Kress, Robert E. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (47 p.) Date:2010 Availability: No items available: Actions: Add to cart
1616. IT induction and information security awareness by Maddock, Valerie. Publication: Ely : IT Governance Publishing, 2010 . 1 online resource (xii, 42 p.) : Date:2010 Availability: No items available: Actions: Add to cart
1617. Managing information risk by Mitchell, Stewart. Publication: Ely, UK : IT Governance Pub., 2009 . 1 online resource (57 p.) , Title from title screen. Date:2009 Availability: No items available: Actions: Add to cart
1618. Mobile Security by Furnell, Steven. Publication: Ely : IT Governance Pub., 2009 . 1 online resource (77 p.) Date:2009 Availability: No items available: Actions: Add to cart
1619. PCI DSS by Calder, Alan. Publication: Ely : IT Governance Pub., 2008 . 1 online resource (45 p.) Date:2008 Availability: No items available: Actions: Add to cart
1620. Security by Kearney, Paul. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (60 p.) Date:2010 Availability: No items available: Actions: Add to cart