Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
658.478 Hum/Gtt : Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 / Ted Humphreys and Angelika Plate     
      Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 / Ted Humphreys and Angelika Plate WATERFT  Book 2005
658.478 Hun/Cco    
      Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff MELB, WATERFT   Book 2004
      Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff MELB, WATERFT   Book 2004
658.478 Hut/Ast : The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson     
      The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson W'PONDS THESES  Book 2005
658.478 Int/Its : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information     
      Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information WATERFT  Book 2008
658.478 Int/Its 2011 : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information     
      Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information WATERFT  Book 2011
658.478 Jah/Hoe    
      Handbook of electronic security and digital forensics / edited by Hamid Jahankhani ... [and others] MELB  Book 2010
      Handbook of electronic security and digital forensics / edited by Hamid Jahankhani ... [and others] MELB  Book 2010
658.478 Jon/Rmf    
      Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden W'BOOL, WATERFT   Book 2005
      Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden W'BOOL, WATERFT   Book 2005
658.478 Ker/Dbs : Digital business security development : management technologies / Don Kerr, John G. Gammack, Kay Bryant, [editors]     
      Digital business security development : management technologies / Don Kerr, John G. Gammack, Kay Bryant, [editors] W'PONDS  Book 2011
658.478 Kho/Ecs    
      E-commerce security : advice from experts / [edited by] Mehdi Khosrow-Pour MELB, W'PONDS   Book 2004
      E-commerce security : advice from experts / [edited by] Mehdi Khosrow-Pour MELB, W'PONDS   Book 2004
658.478 Kou/Ais : Advances in security and payment methods for mobile commerce / Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors     
      Advances in security and payment methods for mobile commerce / Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors MELB  Book 2005
658.478 Kra/Hoi : Handbook of information security management / Micki Krause, Harold F. Tipton, editors     
      Handbook of information security management / Micki Krause, Harold F. Tipton, editors WATERFT  Book 1998
658.478 Lam/Etf : Enhancements to fraud and deception prevention in open multi-agent marketplaces / by Yuk Hei Lam     
      Enhancements to fraud and deception prevention in open multi-agent marketplaces / by Yuk Hei Lam W'PONDS THESES  Book 2006
658.478 Lay/Isd    
      Information security : design, implementation, measurement, and compliance / Timothy P. Layton MELB, WATERFT   Book 2006
      Information security : design, implementation, measurement, and compliance / Timothy P. Layton MELB, WATERFT   Book 2006
658.478 Mer/Epi : The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt     
      The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt WATERFT  CD-ROM 2002
658.478 Mil/Cfd : Compliance for dummies : Sophos special edition / by Lawrence C. Miller     
      Compliance for dummies : Sophos special edition / by Lawrence C. Miller MELB  Book 2010
658.478 Nem/Tap : Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati     
      Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati MELB  Book 2009
658.478 Ngo/Fia : Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou     
      Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou WATERFT ADPML  Book 2005
658.478 Ngo/Rdo    
      Recent developments of human factors and approaches of information security / Leanne Ngo, Wanlei Zhou and Matt Warren MELB, WATERFT ADPML   Book 2005
      Recent developments of human factors and approaches of information security / Leanne Ngo, Wanlei Zhou and Matt Warren MELB, WATERFT ADPML   Book 2005
658.478 Par/Fcc    
      Fighting computer crime : a new framework for protecting information / Donn B. Parker MELB, W'PONDS   Book 1998
      Fighting computer crime : a new framework for protecting information / Donn B. Parker MELB, W'PONDS   Book 1998
658.478 Par/Its : IT security management : IT securiteers - setting up an IT security function / Alberto Partida, Diego Andina     
      IT security management : IT securiteers - setting up an IT security function / Alberto Partida, Diego Andina MELB  Book 2010
658.478 Pat/Mst : Mapping security : the corporate security sourcebook for today's global economy / Tom Patterson with Scott Gleeson Blue     
      Mapping security : the corporate security sourcebook for today's global economy / Tom Patterson with Scott Gleeson Blue W'PONDS  Book 2005
658.478 Pau/Seb    
      Securing electronic business processes : highlights of the Information Security Solutions Europe 2003 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors] MELB  Book 2004
      Securing electronic business processes : highlights of the Information Security Solutions Europe 2004 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors] W'PONDS  Book 2004
658.478 Pur/Mis : A practical guide to managing information security / Steve Purser     
      A practical guide to managing information security / Steve Purser MELB  Book 2004
658.478 Pye/Doi : Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren     
      Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren WATERFT ADPML  Book 2003
658.478 Rav/Rca : Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia     
      Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia MELB  Book 2007
658.478 Ree : Guidelines for automatic data processing physical security and risk management / Susan Reed     
      Guidelines for automatic data processing physical security and risk management / Susan Reed W'PONDS  Microform 1999
658.478 Rob/Cse : Computer security / by D.W. Roberts     
      Computer security / by D.W. Roberts WATERFT  Book 1990
658.478 Sho/Nso : The new school of information security / Adam Shostack and Andrew Stewart     
      The new school of information security / Adam Shostack and Andrew Stewart MELB  Book 2008
658.478 Sta/Csp    
      Computer security : principles and practice / Willam Stallings, Lawrie Brown with contributions by Mick Bauer and Michael Howard MELB, WATERFT   Book 2008
      Computer security : principles and practice / Willam Stallings, Lawrie Brown with contributions by Mick Bauer and Michael Howard MELB, WATERFT   Book 2008
      Computer security : principles and practice / Willam Stallings, Lawrie Brown with contributions by Mick Bauer and Michael Howard MELB, WATERFT   Book 2008
      Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer and Michael Howard WATERFT  Book 2008
658.478 Sta/Csp 2018    
      Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy MELB, W'PONDS   Book 2018
      Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy MELB, W'PONDS   Book 2018
      Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy MELB, W'PONDS   Book 2018
658.478 Von/Isg    
      Information security governance / S.H. von Solms, R. von Solms MELB, WATERFT   Book 2009
      Information security governance / S.H. von Solms, R. von Solms MELB, WATERFT   Book 2009
658.478 War/Ect : An electronic commerce training system / M. Warren, J. Coldwell, A. Willey, D. Hutchinson, D. Moosajee, P. Pempeit and R. Chan     
      An electronic commerce training system / M. Warren, J. Coldwell, A. Willey, D. Hutchinson, D. Moosajee, P. Pempeit and R. Chan WATERFT ADPML  Book 1999
658.478 Whi/Poi    
      Principles of incident response and disaster recovery / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS   Book 2007
      Principles of incident response and disaster recovery / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS   Book 2007
658.478 Whi/Poi 2014    
      Principles of incident response and disaster recovery / Michael E. Whitman, Herbert J. Mattord, Andrew Green MELB, W'PONDS   Book 2014
      Principles of incident response and disaster recovery / Michael E. Whitman, Herbert J. Mattord, Andrew Green MELB, W'PONDS   Book 2014
658.478 Whi/Rac    
      Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord MELB, WATERFT   Book 2005
      Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord MELB, WATERFT   Book 2005
      Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord MELB, WATERFT   Book 2005
658.478 Wil/Ira : Information risk and security : preventing and investigating workplace computer crime / by Edward Wilding     
      Information risk and security : preventing and investigating workplace computer crime / by Edward Wilding WATERFT  Book 2005
658.478 Wol/Dpy : Disaster proof your business : a planning manual for protecting a company's computer, communications & records systems and facilities / Geoffrey H. Wold, Robert F. Shriver     
      Disaster proof your business : a planning manual for protecting a company's computer, communications & records systems and facilities / Geoffrey H. Wold, Robert F. Shriver MELB  Book 1991
658.4780218 Bri/Dii : Draft ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance     
      Draft ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance W'PONDS  Book 2008
658.4780218 Int/Its : Information technology : security techniques : information security management guidelines for telecommunications organizations based on ISO/IEC 27002 = Technologies de l'ìnformation : techniques de sécurité : lignes directrices pour les organismes de télécommunications sur la base de l'ISO/CEI 27002     
      Information technology : security techniques : information security management guidelines for telecommunications organizations based on ISO/IEC 27002 = Technologies de l'ìnformation : techniques de séc WATERFT  Book 2009
658.4780218 Int/Itt    
      Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems = Technologies de l'ìnformation - techniques de séc WATERFT  Book 2007
      Information technology : security techniques : information security incident management = Technologies de l'information : techniques de sécurité : gestion des incidents de sécurité de l'information WATERFT  Book 2011
658.4780973 Jor/Pou : Protection of USA's national information superstructure / C. Jordan and M. Warren     
      Protection of USA's national information superstructure / C. Jordan and M. Warren WATERFT ADPML  Book 2002
658.47809931 Mci/Pon : Protection of New Zealand in the new age / John McIntyre and Matthhew Warren     
      Protection of New Zealand in the new age / John McIntyre and Matthhew Warren WATERFT ADPML  Book 2002
658.4780994 Aus/Cmp : Cookie Monsters? : privacy in the information society : report / by the Senate Select Committee on Information Technologies     
      Cookie Monsters? : privacy in the information society : report / by the Senate Select Committee on Information Technologies WATERFT  Book 2000
658.4780994 Aus/Pot : Proceedings of the ... Australian Information Security Management Workshop     
      Proceedings of the ... Australian Information Security Management Workshop WATERFT ADPML  Book 2000-
658.4780994 Fin/Its : Information technology security : managing challenges and creating opportunities / Dieter Fink     
      Information technology security : managing challenges and creating opportunities / Dieter Fink MELB  Book 1997
658.48012 Cas/Ese : Entrepreneurial strategy : emerging businesses in declining industries / Lucio Cassua, Michael Fattore, Stefano Paleari     
      Entrepreneurial strategy : emerging businesses in declining industries / Lucio Cassua, Michael Fattore, Stefano Paleari MELB  Book 2006
658.487 Cor : A methodology for assessing the security risks associated with computer sites and networks. Part 1, Development of a formal questionnaire for collecting security information / G.C. Corynen     
      A methodology for assessing the security risks associated with computer sites and networks. Part 1, Development of a formal questionnaire for collecting security information / G.C. Corynen W'PONDS  Microform 1999
658.49032 Sfg/Sri 1986    
      Proceedings of the the international conference on mental images, values & reality : 30th annual meeting May 26-30, 1986 University of Pennsylvania / editor in chief: John A. Dillon W'PONDS  Book 1986
      Proceedings of the the international conference on mental images, values & reality : 30th annual meeting May 26-30, 1986 University of Pennsylvania / editor in chief: John A. Dillon W'PONDS  Book 1986
658.5 Aal/Ppm : Business process management : international conference, BPM 2003, Eindhoven, the Netherlands, June 26-27, 2003 : proceedings / Wil van der Aalst, Arthur ter Hofstede, Mathias Weske, eds     
      Business process management : international conference, BPM 2003, Eindhoven, the Netherlands, June 26-27, 2003 : proceedings / Wil van der Aalst, Arthur ter Hofstede, Mathias Weske, eds MELB  Book 2003
658.5 Aal/Ppm 2004 : Business process management : second international conference, BPM 2004, Potsdam, Germany, June 17-18, 2004 ; proceedings / Jörg Desel, Barbara Pernici, Mathias Weske (eds.)     
      Business process management : second international conference, BPM 2004, Potsdam, Germany, June 17-18, 2004 ; proceedings / Jörg Desel, Barbara Pernici, Mathias Weske (eds.) W'PONDS  Book 2004
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next