Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Electronic books
Computer networks
(5)
Data protection
(2)
Business enterprises
(1)
C (Computer program language)
(1)
more ...
Additional Suggested Topics
... within your search.
Computer crimes
(1)
Computer hackers
(1)
Computers
(1)
Configuration management
(1)
Digital communications
(1)
Distributed operating systems (Computers)
(1)
Electronic data processing personnel
(1)
Information resources management
(1)
Information technology
(1)
Radio frequency identification systems
(1)
Security measures
(1)
Software maintenance
(1)
less ...
Showing
1
-
10
of
10
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Building an effective information security policy architecture /
by
Bacik, Sandy
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Oracle identity management governance, risk, and compliance architecture /
by
Pohlman, Marlin B.
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information assurance architecture
by
Willett, Keith D
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
How to achieve 27001 certification an example of applied compliance management /
by
Arnason, Sigurjon Thor
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks /
by
Brancik, Kenneth C
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security management handbook.
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Software deployment, updating, and patching /
by
Stackpole, Bill
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
CISO leadership : essential principles for success /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Digital privacy : theory, technologies, and practices /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Hacking exposed Linux Linux security secrets and solutions /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2008
Suggested Topics: Computer security
Suggested Topics: Electronic books
Institution
KMUTT
(10)
Call Number
Q - Science
(10)
Author
Arnason, Sigurjon Thor
(1)
Bacik, Sandy
(1)
Brancik, Kenneth C
(1)
Pohlman, Marlin B.
(1)
Stackpole, Bill
(1)
more ...
Willett, Keith D
(1)
less ...
Language
English
(10)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website