|
Assessing and managing security risk in IT systems
|
John McCumber |
Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… |
OL13638173W |
|
Codes
|
Richard A Mollin |
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potentia… |
OL15170247W |
|
Public Key Infrastructure
|
John R Vacca |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… |
OL15172981W |
|
A Practical Guide to Security Assessments
|
Sudhanshu Kairab |
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… |
OL8636700W |
|
Building an effective information security policy architecture
|
Sandy Bacik |
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards … |
OL9767255W |