Your search returned 18 results. Subscribe to this search

|
1. Cyber Security : Essential principles to secure your organisation / Calder, Alan.

by Calder, Alan [author.] | Safari, an O'Reilly Media Company.

Edition: 1st edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: IT Governance Publishing, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.
2. The psychology of information security : resolving conflicts between security compliance and human behaviour / Leron Zinatullin.

by Zinatullin, Leron [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 Z56 2016.
3. Nine steps to success : an ISO 27001:2013 implementation overview / Alan Calder.

by Calder, Alan, 1957- [author.].

Edition: Third edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 .C352 2016.
4. EU GDPR : a pocket guide / Alan Calder.

by Calder, Alan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online KJE6071 .C35 2016.
5. PCI DSS : a pocket guide / Alan Calder, Geraint Williams.

by Calder, Alan | Williams, Geraint.

Edition: 5th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 C35 2016.
6. ISO 9001 : 2015 : a pocket guide / Steve Watkins and Nick Orchiston.

by Watkins, Steve, 1970- [author.] | Orchiston, Nick [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TS156.6.
7. Data protection and the cloud : are the risks too great? / Paul Ticher.

by Ticher, Paul [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridgeshire, England : IT Governance Publishing, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37 .T534 2015.
8. Web application security is a stack : how to CYA (Cover Your Apps) completely / Lori Mac Vittie.

by Vittie, Lori Mac [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridgeshire, England : IT Governance Publishing, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 .V588 2015.
9. The security consultant's handbook / Richard Bingley.

by Bingley, Richard [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8290.
10. Application security in the ISO27001 environment / Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan.

by Vinod, Vasudevan [author.] | Mangla, Anoopt [author.] | Ummer, Firosh [author.] | Shetty, Sachin [author.] | Pakala, Sangita [author.] | Anbalahan, Siddharth [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.
11. PCI DSS : a pocket guide / Alan Calder, Geraint Williams.

by Calder, Alan, 1957- [author.] | Williams, Geraint [author.].

Edition: Fourth edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 C35 2015.
12. Cyber essentials : a pocket guide / Alan Calder.

by Calder, Alan [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridgeshire, England : IT Governance Publishing, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 .C353 2014.
13. Assessing information security : strategies, tactics, logic and framework / A. Vladimirov, K. Gavrilenko, A. Michajlowski.

by Vladimirov, Andrew A [author.] | Gavrilenko, Konstantin [author.] | Michajlowski, Anej [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire : IT Governance Publishing, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 V53 2014.
14. Managing information security breaches : studies from real life / Michael Krausz.

by Krausz, Michael [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridgeshire, England : IT Governance Publishing, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 .K738 2014.
15. Controles estratégicos y operacionales de la TI / John Kyriazoglou.

by Kyriazoglou, John.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridge : IT Governance Publishing, [2013]Copyright date: ©2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9 .K97 2013.
16. The case for ISO27001 : 2013 / Alan Calder.

by Calder, Alan, 1957-.

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.
17. Nine steps to success : an ISO27001:2013 implementation overview / Alan Calder.

by Calder, Alan, 1957- [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, United Kingdom : IT Governance Publishing, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 .C384 2013.
18. IT induction and information security awareness : a pocket guide / Valerie Maddock.

by Maddock, Valerie.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Publishing, 2010Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 M33 2010.