Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Data protection
Information technology
Computer security
(6)
Business enterprises
(3)
Computer networks
(3)
Electronic books
(3)
more ...
Additional Suggested Topics
... within your search.
Business
(2)
Computer crimes
(2)
Risk management
(2)
Business information services
(1)
Chief information officers
(1)
Cloud computing
(1)
Database management
(1)
Electronic data processing departments
(1)
Employee crimes
(1)
Quality control
(1)
Security measures
(1)
less ...
Showing
1
-
9
of
9
for search:
''
, query time: 0.55s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
A practical guide to security assessments
by
Kairab, Sudhanshu
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Practical risk management for the CIO
by
Scherling, Mark
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
by
Cappelli, Dawn
Published 2012
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Auditing cloud computing : a security and privacy guide /
by
Halpert, Ben
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Total information risk management : maximizing the value of data and information assets /
Published 2014
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Analyzing security, trust, and crime in the digital world
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives /
by
Collette, Ron
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams /
by
Kouns, Jake
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Advances in enterprise information technology security /
by
Khadraoui, Djamel
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Call Number: H - Social Science
Suggested Topics: Information technology
Suggested Topics: Data protection
Institution
KMUTT
(9)
Library
mai
(3)
Format
MONOGRAPHS
(3)
Call Number
H - Social Science
Author
Cappelli, Dawn
(1)
Collette, Ron
(1)
Halpert, Ben
(1)
Kairab, Sudhanshu
(1)
Khadraoui, Djamel
(1)
more ...
Kouns, Jake
(1)
Scherling, Mark
(1)
less ...
Language
English
(9)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website