This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-17 of 17)
Computer networks -- Security measures -- Standards
1
2007
802.1X port-based authentication
Brown, Edwin Lyle.
Rating:
Electronic Resources
2
2008
CyberWar, CyberTerror, CyberCrime
Mehan, Julie E., author.
Rating:
Electronic Resources
3
2008
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Mehan, Julie E.
Rating:
Electronic Resources
More...
4
2007
Implementing the ISO/IEC 27001 information security management system standard
Humphreys, Ted, author
Boston : Artech House, [2007]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.80218 Hum/Iti
AVAILABLE
5
2016
Implementing the ISO/IEC 27001 ISMS standard
Humphreys, Ted, author.
Second edition
Boston : Artech House, [2016]
Rating:
Electronic Resources
6
2013
Information technology, security techniques : code of practice for information security controls = Technologies de l'information - techniques de sécurité : code de bonne pratique pour le management de
Second edition
Geneva, Switzerland : International Organization for Standardization, 2013
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Itc
AVAILABLE
7
2013
Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information
First edition
Geneva, Switzerland : International Organization for Standardization, 2013
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Itg
AVAILABLE
8
2012
Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité
Geneva, Switzerland : ISO/IEC, 2012
Rating:
Request It
Location
Call no.
Vol.
Availability
WATERFT
005.8 Int/Its 2012
DUE 01-05-23
9
2012
Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'ac
First edition
Geneva, Switzerland : International Organization for Standardization, 2012
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Itu
AVAILABLE
10
2014
Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire
Third edition
Geneva, Switzerland : International Organization for Standardization, 2014
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Ito
AVAILABLE
11
2013
Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de
Second edition
Geneva, Switzerland : International Organization for Standardization, 2013
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Itr
AVAILABLE
12
2008
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sécurité : gestion du risque en de sécurité de l'information
First edition
Geneva : ISO/IEC, [2008]
Rating:
Request It
Location
Call no.
Vol.
Availability
WATERFT BUSINESS
658.478 Int/Its
AVAILABLE
13
2011
Information technology : security techniques : information security risk management = Technologies de l'information : techniques de sećurite ́: gestion du risque en de sećurite ́de l'information
Second edition
Geneva : ISO/IEC, [2011]
Rating:
Request It
Location
Call no.
Vol.
Availability
WATERFT BUSINESS
658.478 Int/Its 2011
AVAILABLE
14
2013
Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée
First edition
Geneva, Switzerland : International Organization for Standardization, 2013
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Itp
AVAILABLE
15
2013
Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité
First edition
Geneva, Switzerland : International Organization for Standardization, 2013
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Int/Itv
AVAILABLE
16
2022
Iso/iec 27001 An Introduction to Information Security and the ISMS Standard
Watkins, Steve
Rating:
Electronic Resources
17
2012
Security automation essentials : streamlined enterprise security management & monitoring with SCAP
Witte, Greg
New York : McGraw-Hill, [2012]
Rating:
Electronic Resources
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search