1 |
|
IT security governance innovations : theory and research / [electronic resource]
|
Mellado, Daniel
|
Information Science Reference
|
2013
|
|
|
2 |
|
Security, design, and architecture for broadband and wireless network technologies [electronic resource] /
|
Chilamkurti, Naveen
|
Information Science Reference
|
2013
|
|
|
3 |
|
Security architect : careers in information security / [electronic resource]
|
Collins, Jon
|
|
2014
|
|
|
4 |
|
Best practices in computer network defense : incident detection and response /
|
NATO Advanced Research Workshop on Best Practices for Computer Network Defense: Incident Detection and Response (2013 : Geneva, Switzerland)
|
|
2014
|
|
|
5 |
|
At the nexus of cybersecurity and public policy : some basic concepts and issues /
|
Clark, David D. Berson, T. A. Lin, Herbert
|
|
2014
|
|
|
6 |
|
Information security auditor /
|
Goucher, Wendy
|
|
2016
|
|
|
7 |
|
Toward better usability, security, and privacy of information technology : report of a workshop /
|
National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems
|
National Academies Press
|
2010
|
|
|
8 |
|
Digital identity and access management : technologies and frameworks / [electronic resource]
|
Sharman, Raj. Smith, Sanjukta Das Gupta, Manish
|
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
|
2012
|
|
|
9 |
|
Privacy solutions and security frameworks in information protection [electronic resource] /
|
Nemati, Hamid R.
|
Information Science Reference
|
2013
|
|
|
10 |
|
Developing and evaluating security-aware software systems [electronic resource] /
|
Khan, Khaled M.
|
Information Science Reference
|
2013
|
|
|