Your search returned 30 results. Subscribe to this search

|
1. Information Security : Design, Implementation, Measurement, and Compliance.

by Layton, Timothy P.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 -- .L393 2007.
2. Asset Protection through Security Awareness.

by Speed, Tyler Justin.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 -- .S643 2011.
3. CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits.

by Tiller, James S.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 -- T56 2012.
4. Building a Practical Information Security Program.

by Andress, Jason | Leary, Mark | Guretz, David.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : Elsevier Science, 2016Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37.A537 2017.
5. Securing Social Media in the Enterprise.

by Dalziel, Henry.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD45.
6. Network Attacks and Exploitation : A Framework

by Monte, Matthew.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD30.38 -- .M668 2015eb.
7. Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks

by Ulsch, MacDonnell.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD30.2 .U47 2014.
8. Measuring and Managing Information Risk : A FAIR Approach

by Freund, Jack | Jones, Jack.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD38.7 .M36.
9. Cyber Security Management : A Governance, Risk and Compliance Framework.

by Trim, Peter | Lee, Yang-Im.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Farnham : Taylor and Francis, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 -- .T74 2014.
10. Responsive Security : Be Ready to Be Secure

by Kang, Meng-Chow.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 .K38 2014.
11. High Performance Cloud Auditing and Applications.

by Han, Keesook J | Choi, Baek-Young | Song, Sejun.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585.
12. The case for ISO27001 : 2013 / Alan Calder.

by Calder, Alan, 1957-.

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.
13. Nine steps to success : an ISO27001:2013 implementation overview / Alan Calder.

by Calder, Alan, 1957- [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 .C384 2013.
14. The true cost of information security breaches and cyber crime / Michael Krausz, John Walker.

by Krausz, Michael | Walker, John (Professor) [aut].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 K732 2013.
15. Asset Protection through Security Awareness.

by Speed, Tyler Justin.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 .S643 2012.
16. Security De-Engineering : Solving the Problems in Information Risk Management

by Tibble, Ian.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 .T53 2011.
17. CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits

by Tiller, James S.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 T56 2012.
18. Once more unto the breach : managing information security in an uncertain world / Andrea C. Simmons.

by Simmons, Andrea C.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [Ely, Cambridgeshire], U.K. : IT Governance Pub., 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 .S56 2012.
19. Threats, countermeasures, and advances in applied information security / Manish Gupta, John Walp, and Raj Sharman, editors.

by Gupta, Manish, 1978- | Walp, John, 1967- | Sharman, Raj | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD30.2 .T4953 2012.
20. Digital business security development : management technologies / Don Kerr, John G. Gammack, Kay Bryant, [editors].

by Kerr, Don, 1952- | Gammack, John G | Bryant, Kay, 1954- | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.32 .D538 2011.