Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff
MELB, WATERFT
2004
Core concepts of Information technology auditing / James E. Hunton, Stephanie M. Bryant, Nancy A. Begranoff
MELB, WATERFT
2004
658.478 Hut/Ast : The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson
The Australian small to medium enterprise E-business Security Methodology (ASME-EBSM) / by Damien Hutchinson
W'PONDS THESES
2005
658.478 Int/Its : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
WATERFT
2008
658.478 Int/Its 2011 : Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
WATERFT
Information security : design, implementation, measurement, and compliance / Timothy P. Layton
MELB, WATERFT
2006
Information security : design, implementation, measurement, and compliance / Timothy P. Layton
MELB, WATERFT
2006
658.478 Mer/Epi : The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt
The e-Privacy imperative : protect your customers' internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt
WATERFT
2002
658.478 Mil/Cfd : Compliance for dummies : Sophos special edition / by Lawrence C. Miller
Compliance for dummies : Sophos special edition / by Lawrence C. Miller
MELB
2010
658.478 Nem/Tap : Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
MELB
2009
658.478 Ngo/Fia : Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou
Federated identity and access management : key drivers, challenges and requirements for business organizations / by Leanne Ngo and Wanlei Zhou
WATERFT ADPML
Securing electronic business processes : highlights of the Information Security Solutions Europe 2003 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors]
MELB
2004
Securing electronic business processes : highlights of the Information Security Solutions Europe 2004 Conference / Sachar Paulus, Norbert Pohlmann, Helmut Reimer, [editors]
W'PONDS
2004
658.478 Pur/Mis : A practical guide to managing information security / Steve Purser
A practical guide to managing information security / Steve Purser
MELB
2004
658.478 Pye/Doi : Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren
Development of I.T. evaluation criteria for common E-business security issues / Graeme Pye and Matthew Warren
WATERFT ADPML
2003
658.478 Rav/Rca : Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia
Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia
MELB
2007
658.478 Ree : Guidelines for automatic data processing physical security and risk management / Susan Reed
Guidelines for automatic data processing physical security and risk management / Susan Reed
W'PONDS
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord
MELB, WATERFT
2005
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord
MELB, WATERFT
2005
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord
MELB, WATERFT
2005
658.478 Wil/Ira : Information risk and security : preventing and investigating workplace computer crime / by Edward Wilding
Information risk and security : preventing and investigating workplace computer crime / by Edward Wilding
WATERFT
2005
658.478 Wol/Dpy : Disaster proof your business : a planning manual for protecting a company's computer, communications & records systems and facilities / Geoffrey H. Wold, Robert F. Shriver
Disaster proof your business : a planning manual for protecting a company's computer, communications & records systems and facilities / Geoffrey H. Wold, Robert F. Shriver
MELB
1991
658.4780218 Bri/Dii : Draft ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance
Draft ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance
W'PONDS
2008
658.4780218 Int/Its : Information technology : security techniques : information security management guidelines for telecommunications organizations based on ISO/IEC 27002 = Technologies de l'ìnformation : techniques de sécurité : lignes directrices pour les organismes de télécommunications sur la base de l'ISO/CEI 27002
Information technology : security techniques : information security management guidelines for telecommunications organizations based on ISO/IEC 27002 = Technologies de l'ìnformation : techniques de séc
WATERFT
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems = Technologies de l'ìnformation - techniques de séc
WATERFT
2007
Information technology : security techniques : information security incident management = Technologies de l'information : techniques de sécurité : gestion des incidents de sécurité de l'information
WATERFT
2011
658.4780973 Jor/Pou : Protection of USA's national information superstructure / C. Jordan and M. Warren
Protection of USA's national information superstructure / C. Jordan and M. Warren
WATERFT ADPML
2002
658.47809931 Mci/Pon : Protection of New Zealand in the new age / John McIntyre and Matthhew Warren
Protection of New Zealand in the new age / John McIntyre and Matthhew Warren
WATERFT ADPML
2002
658.4780994 Aus/Cmp : Cookie Monsters? : privacy in the information society : report / by the Senate Select Committee on Information Technologies
Cookie Monsters? : privacy in the information society : report / by the Senate Select Committee on Information Technologies
WATERFT
2000
658.4780994 Aus/Pot : Proceedings of the ... Australian Information Security Management Workshop
Proceedings of the ... Australian Information Security Management Workshop
WATERFT ADPML
2000-
658.4780994 Fin/Its : Information technology security : managing challenges and creating opportunities / Dieter Fink
Information technology security : managing challenges and creating opportunities / Dieter Fink
MELB
1997
658.48012 Cas/Ese : Entrepreneurial strategy : emerging businesses in declining industries / Lucio Cassua, Michael Fattore, Stefano Paleari
Entrepreneurial strategy : emerging businesses in declining industries / Lucio Cassua, Michael Fattore, Stefano Paleari
MELB
2006
658.487 Cor : A methodology for assessing the security risks associated with computer sites and networks. Part 1, Development of a formal questionnaire for collecting security information / G.C. Corynen
A methodology for assessing the security risks associated with computer sites and networks. Part 1, Development of a formal questionnaire for collecting security information / G.C. Corynen
W'PONDS
Proceedings of the the international conference on mental images, values & reality : 30th annual meeting May 26-30, 1986 University of Pennsylvania / editor in chief: John A. Dillon
W'PONDS
1986
Proceedings of the the international conference on mental images, values & reality : 30th annual meeting May 26-30, 1986 University of Pennsylvania / editor in chief: John A. Dillon
W'PONDS
1986
658.5 Aal/Ppm : Business process management : international conference, BPM 2003, Eindhoven, the Netherlands, June 26-27, 2003 : proceedings / Wil van der Aalst, Arthur ter Hofstede, Mathias Weske, eds
Business process management : international conference, BPM 2003, Eindhoven, the Netherlands, June 26-27, 2003 : proceedings / Wil van der Aalst, Arthur ter Hofstede, Mathias Weske, eds
MELB
2003
658.5 Aal/Ppm 2004 : Business process management : second international conference, BPM 2004, Potsdam, Germany, June 17-18, 2004 ; proceedings / Jörg Desel, Barbara Pernici, Mathias Weske (eds.)
Business process management : second international conference, BPM 2004, Potsdam, Germany, June 17-18, 2004 ; proceedings / Jörg Desel, Barbara Pernici, Mathias Weske (eds.)
W'PONDS