|
Assessing and managing security risk in IT systems
|
John McCumber |
Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… |
OL13638173W |
|
The Executive’s Guide to Privacy Management
|
Michael Erbschloe |
A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… |
OL15183825W |
|
Information security policies, procedures, and standards
|
Thomas R. Peltier |
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An ef… |
OL1978189W |
|
Bigelow's virus troubleshooting pocket reference
|
Ken Dunham |
Identify, Diagnose and Combat Computer Viruses Now! With the growing number of viruses infecting computers—and an increasing level of damage—safeguarding your system has never been more important tha… |
OL225240W |
|
A Practical Guide to Security Assessments
|
Sudhanshu Kairab |
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… |
OL8636700W |
|
Investigator's Guide to Steganography
|
Gregory Kipper |
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incide… |
OL8637041W |
|
Multimedia Content Encryption
|
Shiguo Lian |
"The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. I… |
OL9767344W |