Skip to content
VuFind

KnowledgeCentre@Bursa

Advanced
Advanced
  • Search: "COMPUTER SECURITY"
Suggested Topics... within your search.
COMPUTER SECURITY 6 DATA PROTECTION 3 PRIVACY, RIGHT OF 2
COMPUTER NETWORKS-SECURITY MEASURES 1 COMPUTER NETWORKS-SECURITY MEASURES-STANDARDS 1 COMPUTER SECURITY-HANDBOOKS 1
more ...
COMPUTER SECURITY-MANAGEMENT 1 COMPUTER SECURITY-MANAGEMENT-STANDARDS 1 COMPUTER SOFTWARE-DEVELOPMENT 1
CRISIS MANAGEMENT-HANDBOOKS 1 DATA PROTECTION-HANDBOOKS 1 DATA RECOVERY-HANDBOOKS 1
DISASTER RECOVERY 1 ELECTRONIC SURVEILLANCE - SOCIAL ASPECTS 1 EMERGENCY MANAGEMENT-HANDBOOKS 1
INFORMATION TECHNOLOGY- SOCIAL ASPECTS 1 INTERNET-SECURITY MEASURES 1 SOCIAL CONTROL 1
less ...
Showing 1 - 9 of 9 for search: '"COMPUTER SECURITY"', query time: 0.13s
Cover Image
Secrets & lies : digital security in a networked world /
by SCHNEIER
Published 2000
Subjects: '; “...COMPUTER SECURITY...”
Call Number: Loading...
Located: Loading...
Loading...
Cover Image
Security Risk Management : Body Of Knowledge /
by Talbot
Published 2009
Subjects: '; “...COMPUTER SECURITY-MANAGEMENT...”
Call Number: Loading...
Located: Loading...
Loading...
Cover Image
HANDBOOK of information security management /
Published 1997
Subjects: '; “...COMPUTER SECURITY...”
Call Number: Loading...
Located: Loading...
Loading...
Cover Image
Contigency planning and disaster recovery : protecting your organization's resources /
by BUTLER
Published 1997
Subjects: '; “...COMPUTER SECURITY...”
Call Number: Loading...
Located: Loading...
Loading...
Cover Image
Threat Modeling Designing For security : Adam Shostack.
by Shostack
Published 2014
Subjects: '; “...COMPUTER SECURITY...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Cover Image
The Art Of Invisibility : The World's Most Famous Hacker Teaches You How To Be Safe In The Age Of Big Brother And Big Data /
by Mitnick
Published 2017
Subjects: '; “...COMPUTER SECURITY...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Cover Image
Implementing The ISO/IEC 27001 ISMS Standard(second edition) : Edward Humphreys.
by Humphreys
Published 2016
Subjects: '; “...COMPUTER SECURITY-MANAGEMENT-STANDARDS...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Cover Image
Data And Goliath : The Hidden Battles To Collect Your data And Control Your World /
by Schneier
Published 2015
Subjects: '; “...COMPUTER SECURITY...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Cover Image
The Disaster Recovery Handbook(2nd Edition) : Michael Wallace.
by Wallace
Published 2011
Subjects: '; “...COMPUTER SECURITY-HANDBOOKS...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Search Tools: Get RSS Feed

Narrow Search

Collection
9 Book
Call Number
5 000 - Computer science, information & general works 3 600 - Technology
Author
1 BUTLER 1 Humphreys 1 Mitnick 1 SCHNEIER 1 Schneier 1 Shostack more ... 1 Talbot 1 Wallace less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...