Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff
MELB, WATERFT
2004
Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff
MELB, WATERFT
2004
658.478 Hut/Ast : The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson
The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson
W'PONDS THESES
2005
658.478 Int/Its : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
WATERFT
2008
658.478 Int/Its 2011 : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
WATERFT
Information security : design, implementation, measurement, and compliance / Timothy P. Layton
MELB, WATERFT
2006
Information security : design, implementation, measurement, and compliance / Timothy P. Layton
MELB, WATERFT
2006
658.478 Mer/Epi : The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt
The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt
WATERFT
2002
658.478 Mil/Cfd : Compliance for dummies : Sophos special edition / by Lawrence C. Miller
Compliance for dummies : Sophos special edition / by Lawrence C. Miller
MELB
2010
658.478 Nem/Tap : Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
MELB
2009
658.478 Ngo/Fia : Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou
Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou
WATERFT ADPML
Securing electronic business processes : highlights of the Information Security Solutions Europe 2003 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors]
MELB
2004
Securing electronic business processes : highlights of the Information Security Solutions Europe 2004 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors]
W'PONDS
2004
658.478 Pur/Mis : A practical guide to managing information security / Steve Purser
A practical guide to managing information security / Steve Purser
MELB
2004
658.478 Pye/Doi : Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren
Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren
WATERFT ADPML
2003
658.478 Rav/Rca : Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia
Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia
MELB
2007
658.478 Ree : Guidelines for automatic data processing physical security and risk management / Susan Reed
Guidelines for automatic data processing physical security and risk management / Susan Reed
W'PONDS
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord
MELB, WATERFT
2005
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord
MELB, WATERFT
2005
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord
MELB, WATERFT
2005
658.478 Wil/Ira : Information risk and security : preventing and investigating workplace computer crime / by Edward Wilding
Information risk and security : preventing and investigating workplace computer crime / by Edward Wilding
WATERFT
2005
658.478 Wol/Dpy : Disaster proof your business : a planning manual for protecting a company's computer, communications & records systems and facilities / Geoffrey H. Wold, Robert F. Shriver
Disaster proof your business : a planning manual for protecting a company's computer, communications & records systems and facilities / Geoffrey H. Wold, Robert F. Shriver
MELB
1991
658.4780218 Bri/Dii : Draft ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance
Draft ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance
W'PONDS
2008
658.4780218 Int/Its : Information technology : security techniques : information security management guidelines for telecommunications organizations based on ISO/IEC 27002 = Technologies de l'ìnformation : techniques de sécurité : lignes directrices pour les organismes de télécommunications sur la base de l'ISO/CEI 27002
Information technology : security techniques : information security management guidelines for telecommunications organizations based on ISO/IEC 27002 = Technologies de l'ìnformation : techniques de séc
WATERFT