Call Number (LC) | Title | Results |
---|---|---|
HF5548.37 .B664 2017 | Cognitive hack : the new battleground in cybersecurity... the human mind / | 1 |
HF5548.37 .B666 2010 | Enterprise data governance : reference & master data management, semantic modeling / | 1 |
HF5548.37 .B685 2008 | Business continuity planning for data centers and systems : a strategic implementation guide / | 1 |
HF5548.37 .B685 2008eb | Business continuity planning for data centers and systems : a strategic implementation guide / | 1 |
HF5548.37 .B76 2009eb | Information security governance : a practical development and implementation approach / | 1 |
HF5548.37 .C35 2008eb | Business continuity and BS25999 : a combined glossary / | 1 |
HF5548.37 .C35 2017 | Nine steps to success : an ISO 27001:2013 implementation overview / | 1 |
HF5548.37 .C35 2017eb |
ISO27001/ISO27002 : guida tascabile / I nove passi per il successo : compendio per l 'attuazione della norma ISO 27001:2013 / ISO27001/ISO27002 ISO27001/ISO27002 : una guía de bolsillo / |
4 |
HF5548.37 .C351 2007eb | Risk Assessment for Asset Owners : a Pocket Guide. | 1 |
HF5548.37 .C352 2005eb | Nine steps to success : an ISO 27001 implementation overview / | 1 |
HF5548.37 .C352 2016eb | Nine steps to success : an ISO 27001:2013 implementation overview / | 1 |
HF5548.37 .C352 2017eb |
Nueve pasos para el éxito : una visión de conjunto para la aplicación de la ISO 27001:2013 / Neuf étapes vers le succès : un aperçu de la mise en oeuvre de la norme ISO 27001:2013 / |
2 |
HF5548.37 .C384 2012 | Cloud Computing : Assessing the Risks. | 2 |
HF5548.37 .C64 2002 | Computer security handbook / | 1 |
HF5548.37 .C64 2002eb | Computer security handbook / | 1 |
HF5548.37 .C64 2009eb | Computer security handbook. | 2 |
HF5548.37 .C64 2014 | Computer security handbook / | 1 |
HF5548.37 .C66 2012 | Computer Security Handbook. | 1 |
HF5548.37 .D46 2014 | The privacy engineer's manifesto : getting from policy to code to QA to value / | 1 |
HF5548.37 .E58 2009eb | Enterprise information security and privacy / | 2 |