61
Published 2013
Table of Contents: '; ...Back to Basics: Information Security Education for the Youth via Gameplay -- Virtual Penetration...
Get full text
Electronic
62
Published 1999
Subjects: '; ...Information security and ethics...
View fulltext via EzAccess
Electronic
63
Published 2012
Table of Contents: '; ... -- 2. The contributions of information security culture and human relations to the improvement...
Chapter PDFs via platform:
Electronic
64
Published 2012
Subjects: '; ...Information security...
Chapter PDFs via platform:
Electronic
65
Published 2009
Table of Contents: '; ... of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves...
View fulltext via EzAccess
Electronic
66
Published 2008
Subjects: '; ...Information security and privacy...
View fulltext via EzAccess
Electronic
67
Published 2009
Subjects: '; ...Information security management...
View fulltext via EzAccess
Electronic
68
Published 2005
Subjects: '; ...Information security management...
View fulltext via EzAccess
Electronic
69
Published 2009
Table of Contents: '; ... Serendipitous Social Encounters in Urban Neighbourhoods / Marcus Foth -- Information Security Effectiveness...
View fulltext via EzAccess
Electronic
70
by Tong, Carrison K. S., 1962-
Published 2009
Table of Contents: '; ...1. Introduction -- 2. ISO 27000 Information Security Management System -- 3. High availability...
View fulltext via EzAccess
Electronic
71
Published 2008
Subjects: '; ...Medical information security...
View fulltext via EzAccess
Electronic
72
Published 2007
Table of Contents: '; ... -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot...
View fulltext via EzAccess
Electronic
73
by Broad, James.
Published 2013
Subjects: '; ...Electronic government information Security measures United States....
View fulltext via EzAccess
eBook
74
Published 2010
Subjects: '; ...Information security...
View fulltext via EzAccess
Electronic
75
Published 2009
Table of Contents: '; ... architecture as context and method for designing and implementing information security and data privacy...
View fulltext via EzAccess
Electronic
76
Published 2010
Subjects: '; ...Applications in information security...
View fulltext via EzAccess
Electronic
77
Published 2005
Subjects: '; ...Information security...
View fulltext via EzAccess
Electronic
78
79
Published 2009
Table of Contents: '; ... of Information Security -- Productivity Space of Information Security in an Extension of the -- Gordon-Loeb...
Get full text
Electronic
80
Get full text
Electronic