Books

7 results found
Title Authors Description OpenBook ID
Assessing and managing security risk in IT systems Assessing and managing security risk in IT systems John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… OL13638173W
The Executive’s Guide to Privacy Management The Executive’s Guide to Privacy Management Michael Erbschloe A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… OL15183825W
Information security policies, procedures, and standards Information security policies, procedures, and standards Thomas R. Peltier By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An ef… OL1978189W
Bigelow's virus troubleshooting pocket reference Bigelow's virus troubleshooting pocket reference Ken Dunham Identify, Diagnose and Combat Computer Viruses Now! With the growing number of viruses infecting computers—and an increasing level of damage—safeguarding your system has never been more important tha… OL225240W
A Practical Guide to Security Assessments A Practical Guide to Security Assessments Sudhanshu Kairab The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… OL8636700W
Investigator's Guide to Steganography Investigator's Guide to Steganography Gregory Kipper Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incide… OL8637041W
Multimedia Content Encryption Multimedia Content Encryption Shiguo Lian "The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. I… OL9767344W