Classify

An experimental classification web service

Powered by the Classify Web Service.

Search Results

Search Criteria: FAST heading = Computer security--Management
Displaying 1 to 25 of 1113
Title & Author Format Holdings Editions From To
Computer and information security handbook by Vacca, John R.
DDC/LCC
  4605 68 2009 2017
Information security management handbook by Tipton, Harold F.
DDC/LCC
  3628 190 1999 2050
Nine steps to success : an ISO 27001 implementation overview by Calder, Alan, 1957-
DDC/LCC
  2924 30 2005 2019
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy by Engebretson, Pat (Patrick Henry), 1974-
DDC/LCC
  2592 64 2010 2017
Advanced penetration testing for highly-secured environnements : employ the most advenced pentesting techniques and tools to build highly-secured systems and environnements by Allen, Lee (Information security specialist)
DDC/LCC
  2589 28 2012 2016
Hack proofing your network : internet tradecraft by Russell, Ryan, 1969-
DDC/LCC
  2450 43 2000 2002
Selling information security to the Board : a primer by Calder, Alan, 1957-
DDC/LCC
  2397 16 2010 2016
Google hacking for penetration testers by Long, Johnny
DDC/LCC
  2381 64 2004 2016
Information security breaches : avoidance and treatment based on ISO27001 by Krausz, Michael
DDC/LCC
  2377 20 2009 2014
Once more unto the breach : managing information security in an uncertain world by Simmons, Andrea C.
DDC/LCC
  2368 25 2012 2015
Network security assessment : from vulnerability to patch by Manzuik, Steve
DDC/LCC
  2325 26 2006 2009
Assessing information security : strategies, tactics, logic and framework by Vladimirov, Andrew A.
DDC/LCC
  2296 25 2010 2015
The art of deception : controlling the human element of security by Mitnick, Kevin D. (Kevin David), 1963-
DDC/LCC
  2283 29 2001 2015
The silicon jungle : a novel of deception, power, and internet intrigue by Baluja, Shumeet, 1971-
DDC/LCC
  2241 22 2011 2015
Nessus, Snort, & Ethereal power tools : customizing open source security applications by Archibald, Neil
DDC/LCC
  2227 26 2005 2014
Information security risk management for ISO27001/ISO27002 by Calder, Alan, 1957-
DDC/LCC
  2216 14 2010 2019
When bad grammar happens to good people : how to avoid common errors in English by Batko, Ann
DDC/LCC
  2206 20 2004 2017
The best damn cybercrime and digital forensics book period by Wiles, Jack
DDC/LCC
  2120 19 2007 2011
Managing information security breaches : studies from real life by Krausz, Michael
DDC/LCC
  2089 19 2010 2015
Business continuity and disaster recovery planning for it professionals by Snedaker, Susan
DDC/LCC
  2062 35 2007 2014
Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux by Buchanan, Cameron
DDC/LCC
  2059 22 2015 2018
Cyber spying : tracking your family's (sometimes) secret online lives by Fair, Ted
DDC/LCC
  2046 15 2005 2009
A practical guide to managing information security by Purser, Steve
DDC/LCC
  2032 13 2004 2004
How to cheat at managing information security by Osborne, Mark, 1970-
DDC/LCC
  2021 20 2006 2014
Professional issues in information technology by Bott, Frank
DDC/LCC/NLM
  2016 35 2005 2017
Displaying 1 to 25 of 1113
.