Your search returned 4 results. Subscribe to this search

|
1. Information Security : Design, Implementation, Measurement, and Compliance.

by Layton, Timothy P.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 -- .L393 2007.
2. Industrial Espionage : Developing a Counterespionage Program

by Benny, Daniel J.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD38.7 .B455 2013.
3. Media exposure and risk : proven practices / Kenneth Kasten/

by Kasten, Kenneth.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oxford ; Waltham, MA : Elsevier, ,2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HG1590.
4. The case for ISO27001 : 2013 / Alan Calder.

by Calder, Alan, 1957-.

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.