Search again

Found: 8  Titles

Order by :    Show:   Per Page
image

image
Information security governance : a practical development and implementation approach / Krag Brotby
Author
Brotby, Krag
Published
Hoboken, NJ : John Wiley, c2009
Call Number
HF5548.37 B738i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams / Jake Kouns, Daniel Minoli.
Author
Kouns, Jake.
Published
Hoboken, NJ : John Wiley, c2010.
Call Number
HF5548.37 K663i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Information warfare / Daniel Ventre
Author
Ventre, Daniel
Published
London : ISTE, c2009
Call Number
HD38.7 V404i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Privacy in social networks Elena Zheleva, Evimaria Terzi, Lise Getoor.
Author
Zheleva, Elena.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
HM742 .Z446 2012,302.30285 23

image
Privacy-preserving data publishing an overview / Raymond Chi-Wing Wong and Ada Wai-Chee Fu.
Author
Wong, Raymond Chi-Wing.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool Publishers, c2010.
Call Number
HF5548.37 .W656 2010,658.478 22

image
Security for small computer systems : a practical guide for users / edited by Tricia Saddington.
Published
Oxford : Elsevier, 1988.
Call Number
HF5548.2 S41
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / Dawn Cappelli, Andrew Moore, Randall Trzeciak
Author
Cappelli, Dawn
Published
Upper Saddle River, NJ : Addison-Wesley, c2012
Call Number
HV6773 C292c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles