Suggested Topics within your search.
Suggested Topics within your search.
61
Published 2013
Table of Contents: ';
“...Back to Basics: Information Security Education for the Youth via Gameplay -- Virtual Penetration...”Get full text
Electronic
62
Published 1999
Subjects: ';
“...Information security and ethics...”View fulltext via EzAccess
Electronic
63
Published 2012
Table of Contents: ';
“... -- 2. The contributions of information security culture and human relations to the improvement...”Chapter PDFs via platform:
Electronic
64
65
Published 2009
Table of Contents: ';
“... of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves...”View fulltext via EzAccess
Electronic
66
Published 2008
Subjects: ';
“...Information security and privacy...”View fulltext via EzAccess
Electronic
67
Published 2009
Subjects: ';
“...Information security management...”View fulltext via EzAccess
Electronic
68
Published 2005
Subjects: ';
“...Information security management...”View fulltext via EzAccess
Electronic
69
Published 2009
Table of Contents: ';
“... Serendipitous Social Encounters in Urban Neighbourhoods / Marcus Foth -- Information Security Effectiveness...”View fulltext via EzAccess
Electronic
70
by Tong, Carrison K. S., 1962-
Published 2009
Table of Contents: ';
“...1. Introduction -- 2. ISO 27000 Information Security Management System -- 3. High availability...”Published 2009
View fulltext via EzAccess
Electronic
71
Published 2008
Subjects: ';
“...Medical information security...”View fulltext via EzAccess
Electronic
72
Published 2007
Table of Contents: ';
“... -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot...”View fulltext via EzAccess
Electronic
73
by Broad, James.
Published 2013
Subjects: ';
“...Electronic government information Security measures United States....”Published 2013
View fulltext via EzAccess
eBook
74
75
Published 2009
Table of Contents: ';
“... architecture as context and method for designing and implementing information security and data privacy...”View fulltext via EzAccess
Electronic
76
Published 2010
Subjects: ';
“...Applications in information security...”View fulltext via EzAccess
Electronic
77
78
79
Published 2009
Table of Contents: ';
“... of Information Security -- Productivity Space of Information Security in an Extension of the -- Gordon-Loeb...”Get full text
Electronic
80