Skip to content
  • PipelineMT
  • Athletics
  • A-Z
  • Directory
  • MTSU Email
  • Search MTSU
Middle Tennessee State University Logo

James E. Walker Library

  • Your Account
  • Log Out
  • Login
  • 0 items (Full)

Libraries Catalog

  • Search
    • Regular Search
    • Advanced Search
    • Search History
  • Browse
  • Course Reserves
  • Language
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
  • 0 items (Full)
  • Your Account
  • Log Out
  • Login
Advanced
Ask Us!Toggle Chat Widget

Call Us: 615-898-2817
Send an Email
reference@mtsu.libanswers.com
Search FAQs

  • The business case for network...
  • Holdings
  • Cite this
  • Text this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to MARC
    • Export to MARCXML
    • Export to RDF
  • Save to List
  • Add to Book Bag Remove from Book Bag
The business case for network security : advocacy, governance, and ROI /

The business case for network security : advocacy, governance, and ROI /

Saved in:
Bibliographic Details
Main Author: Paquet, Catherine.
Other Authors: Saxe, Warren.
Format: eBook
Language:English
Published: Indianapolis, Ind. : Cisco Press, ©2005.
Series:Network business series.
Subjects:
Computer networks > Security measures.
Computer security.
Computer security > United States > Management.
Data protection.
Data protection > Management.
Online Access:CONNECT
CONNECT
  • Holdings
  • Description
  • Table of Contents
  • Similar Items
  • Staff View

Internet

CONNECT
CONNECT

Similar Items

  • Network infrastructure security /
    by: Wong, Angus.
    Published: (2009)
  • Preparing for a network incident /
    Published: (2015)
  • Spring Security.
    by: Knutson, Mick.
    Published: (2017)
  • Security and privacy in cyber-physical systems : foundations, principles, and applications /
    Published: (2018)
  • Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy /
    by: Shingornikar, Shashank,, et al.
    Published: (2022)
Middle Tennessee State University
MTSU Library Logo
Facebook Link Twitter Link Instagram Link
True Blue
Federal Depository library Walker Library is a selective depository library.
Middle Tennessee State University © 2023 Nondiscrimination Policy Terms Privacy Statement Intranet
Login to LibApps
Loading...