Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Subjects (1-13 of 13)
Electronic Data Processing Departments Security Measures
1
E-Book/E-Doc
 

Business continuity and disaster recovery planning for IT professionals


Snedaker, Susan.
Waltham, MA : Syngress, [2014] 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
E-Book/E-Doc
 

Business continuity and disaster recovery planning for IT professionals


Snedaker, Susan.
Waltham, MA : Syngress, ©2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
3
Print Material
 

Computer crime : computer security techniques.



Washington, D.C. : U.S. Dept. of Justice, Bureau of Justice Statistics, 1982. 1982

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe Archives Fed Docs  J 29.2:C 86    ---  Available
4
E-Book/E-Doc
 

Computer security handbook



Hoboken, New Jersey : Wiley, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
5
Print Material
 

Corporate computer and network security


Panko, R. R.
Upper Saddle River, NJ : Pearson Prentice Hall, c2004. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.8 P194c 2004    ---  Available
6
E-Book/E-Doc
 

Data governance : how to design, deploy and sustain an effective data governance program


Ladley, John.
[Place of publication not identified] : Academic Press, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
7
E-Book/E-Doc
 

Managing information security



Amsterdam ; Waltham, MA : Syngress, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
8
E-Book/E-Doc
 

Managing the human factor in information security how to win over staff and influence business manag


Lacey, David.
Chichester, West Sussex, England ; Hoboken, NJ : Wiley, c2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
9
E-Book/E-Doc
 

Physical security for IT


Erbschloe, Michael, 1951-
Amsterdam ; Boston : Elsevier Digital Press, ©2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
10
Print Material
 

Privacy and security in computer based systems using encryption


Dreher, Felix F.
[Pittsburg, Kan.] : Pittsburg State University. Gladys A. Kelce School of Business and Economics, [1979?] 1979?

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe PSU Archives Kansas Documents  KD E 26.3013:7 c.2  ---  Lib Use Only
11
E-Book/E-Doc
 

Security architect : careers in information security


Collins, Jon, author.
Swindon, England : BCS, The Chartered Institute for IT, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
12
E-Book/E-Doc
 

Selling information security to the board : a primer


Calder, Alan, author.
Cambridgeshire, England : IT Governance Publishing, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
13
E-Book/E-Doc
 

The ultimate computer security survey


Schaub, James L.
Boston : Butterworth-Heinemann, [1995] 1995

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only