Refine your search

Your search returned 19 results.

Not what you expected? Check for suggestions
introduction to information security risk management NIIT

by NIIT.

Publisher: New Delhi : Prentice-Hall of India Pvt.Ltd. 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 NII (1).
Database and applications security: integrating information security and data management integrating information security and data management Bhavani Thuraisingham

by Thuraisingham, Bhavani M.

Publisher: Boca Raton, FL : Auerbach Publications, 2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 THU (1).
The basics of information security : understanding the fundamentals of InfoSec in theory and practice understanding the fundamentals of InfoSec in theory and practice Jason Andress.

by Andress, Jason.

Source: Safari Technical Books (Current File)Source: ScienceDirect Computer Science eBook Collection 2011Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, c2011Online access: Full text available from Safari Technical Books (Current File) | Full text available from ScienceDirect Computer Science eBook Collection 2011 Availability: Items available for loan: Central Library (CL)Call number: 005.8 AND (1).
Hands-on information security lab manual by Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Clifton Park, N.Y. : Andover : Delmar ; Cengage Learning [distributor], c2011Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 WHI (1).
A practical guide to managing information security / Steve Purser.

by Purser, Steve.

Publisher: Boston, MA : Artech House, 2004Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 658.478,PUR (1). :
Information security management handbook: volume 2 Harold F. Tipton, Micki Krause, editors.

by Krause, Micki | Tipton, Harold F.

Edition: 5th ed. Publisher: Boca Raton, Fl : Auerbach, 2003-<2006>Online access: Publisher description Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 658.0558,INF (1). :
Secure data networking / Michael Purser.

by Purser, Michael.

Publisher: Boston : Artech House, c1993Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PUR (1).
Database and applications security : integrating information security and data management / Bhavani Thuraisingham.

by Thuraisingham, Bhavani M.

Publisher: Boca Raton, FL : Auerbach Publications, 2005Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8, BHA (2).
CISA--Certified Information Systems Auditor : (Include CD) study guide / David L. Cannon, Timothy S. Bergmann, Brady Pamplin.

by Cannon, David L | Bergmann, Timothy S | Pamplin, Brady.

Publisher: Indianapolis, Indiana : Wiley Pub., c2006Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478,CAN (1).
CISA Certified Information Systems Auditor Study Guide (EBOOK) [Elektronisk resurs].

by Cannon, David L.

Edition: 3rd ed. Publisher: Hoboken : John Wiley & Sons, Inc., 2011Online access: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8076 CAN (1).
Principle of Computer Security Com TIA Security +TM and Beyond, lab manual / Vincent Nestler ... [et al.].

by Nestler, Vincent J.

Edition: 2nd ed. Publisher: New York : McGraw-Hill Osborne Media, c2011Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,VIN (1).
CISA: certified information systems auditor study guide (EBOOK) David L. Cannon.

by Cannon, David L.

Edition: 2nd ed. Publisher: Hoboken, NJ : Wiley Pub., c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 CAN (1).
CISA: certified information systems auditor study guide (EBOOK) David Cannon.

by Cannon, David L.

Edition: 3rd ed. Publisher: Indianapolis, Ind. : Wiley Pub., c2011Online access: Cover image Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 CAN (1).
Encyclopedia of policy studies / Rainer Nagel.

by Nagel, Rainer | Nagel, Stuart.

Edition: 2nd ed. Publisher: [S.l.] : CRC Press, 1994Online access: Amazon.com | Amazon customer reviews Availability: Items available for reference: Central Library (CL) Not for loanCall number: 320.603 NAG (1). :
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace and Lawrence Webber.

by Wallace, Michael | Webber, Larry | ebrary, Inc.

Edition: 1 st ed.Material type: Text Text Publisher: India,New Delhi : Prentice Hall, c2007Online access: Click here to access online Availability: Items available for loan: Military College of Engineering (MCE) Call number: 658.478 WAL (1).
Disaster proofing information systems, a complete methodology for eliminating single points of failure

by Buchanan, Robert W.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW YORK MCGRAW HILL 2003Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.86 BUC (1).
Effective cybersecurity : understanding and using standards and best practices / William Stallings.

by Stallings, William [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, [2019]Copyright date: ©2019Other title: Effective cybersecurity: a guide to using best practices and standards.Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,STA (1).
Cyber Security: Power and Technology / edited by Martti Lehto, Pekka Neittaanmäki.

by Lehto, Martti [editor.] | Neittaanmäki, Pekka [editor.].

Edition: 1st ed. 2018.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 355.42,LEH (1). :
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.