Your search returned 26 results.

|
1.
ISO22301 : 2019 - an introduction to a business continuity management system (BCMS).

by Calder, Alan, 1957-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [S.l.] : ITGP, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD61.
2.
Information Security : Design, Implementation, Measurement, and Compliance.

by Layton, Timothy P.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 -- .L393 2007.
3.
CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits.

by Tiller, James S.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- T56 2012.
4.
Risk Analysis and Security Countermeasure Selection, Second Edition.

by Norman, Thomas L. CPP/PSP/CSC.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8290 .N67 2015.
5.
Network Attacks and Exploitation : A Framework

by Monte, Matthew.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 -- .M668 2015eb.
6.
Risk Analysis and Security Countermeasure Selection.

by Norman CPP/PSP/CSC, Thomas L.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : Taylor & Francis Group, 2015Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8290 .N67 2015.
7.
Network Attacks and Exploitation : A Framework.

by Monte, Matthew | Monte, Matthew.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 -- .M668 2015.
8.
Measuring and Managing Information Risk : A FAIR Approach

by Freund, Jack | Jones, Jack.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD38.7 .M36.
9.
Security Convergence : Managing Enterprise Security Risk

by Tyson, Dave.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD61.5 .T97 2007eb.
10.
Cyber Security Management : A Governance, Risk and Compliance Framework.

by Trim, Peter | Lee, Yang-Im.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Farnham : Taylor and Francis, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 -- .T74 2014.
11.
Security Management : A Critical Thinking Approach

by Land, Michael | Ricks, Truett | Ricks, Bobby.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD61.5 .L36 2013.
12.
The case for ISO27001 : 2013 / Alan Calder.

by Calder, Alan, 1957-.

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
13.
Nine steps to success : an ISO27001:2013 implementation overview / Alan Calder.

by Calder, Alan, 1957- [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C384 2013.
14.
The true cost of information security breaches and cyber crime / Michael Krausz, John Walker.

by Krausz, Michael | Walker, John (Professor) [aut].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 K732 2013.
15.
IT security governance innovations : theory and research / Daniel Mellado ... [et al.], editors.

by Mellado, Daniel, 1980- | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I894 2013.
16.
Security De-Engineering : Solving the Problems in Information Risk Management

by Tibble, Ian.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .T53 2011.
17.
CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits

by Tiller, James S.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 T56 2012.
18.
Once more unto the breach : managing information security in an uncertain world / Andrea C. Simmons.

by Simmons, Andrea C.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [Ely, Cambridgeshire], U.K. : IT Governance Pub., 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .S56 2012.
19.
Digital business security development : management technologies / Don Kerr, John G. Gammack, Kay Bryant, [editors].

by Kerr, Don, 1952- | Gammack, John G | Bryant, Kay, 1954- | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.32 .D538 2011.
20.
Selling information security to the board : a primer.

by Calder, Alan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Pub., 2010Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37.