Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Subjects (1-10 of 10)
Computer Security Management Handbooks Manuals Etc
1
Print Material
 

Information security management handbook



Boca Raton, Fla. ; London : Auerbach, c2005. 2004

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 2nd Floor Stacks  658.0558 In3 2004    ---  Missing
2
E-Book/E-Doc
 

Information security management handbook.



Boca Raton : Auerbach Publications, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
3
E-Book/E-Doc
 

Information security management handbook.



Boca Raton, Fla. : CRC Press, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
4
E-Book/E-Doc
 

Syngress IT security project management handbook


Snedaker, Susan.
Rockland, MA : Syngress Pub., ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
5
E-Book/E-Doc
 

Syngress IT security project management handbook


Snedaker, Susan.
Rockland, MA : Syngress Publishing, c2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Computer Security Management Standards
6
E-Book/E-Doc
 

The case for ISO27001 : 2013


Calder, Alan, author.
Cambridgeshire, England : IT Governance Publishing, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
7
E-Book/E-Doc
 

Information security breaches : avoidance and treatment based on ISO27001


Krausz, Michael, author.
Cambridgeshire, [England] : IT Governance Publishing, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Computer Security Mathematical Models
8
E-Book/E-Doc
 

A proposed modeling protocol for evaluating information attacks


Brand, John H, II, author.
Aberdeen Proving Ground, MD : Army Research Laboratory, January 1999. 1999-

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.133/2:112    ---  Available
Computer Security Mathematics
9
E-Book/E-Doc
 

Cybersecurity and applied mathematics


Metcalf, Leigh, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
10
E-Book/E-Doc
 

Security of block ciphers : from algorithm design to hardware implementation


Sakiyama, Kazuo, 1971- author.
Singapore : Wiley, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only