1. Managing information systems security and privacy

by Trcek, Denis.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 005.8068 TRC] (1).
2. Computer security lab manual

by Nestler, Vincent J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
3. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
4. Information warfare

by Ventre, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
5. Writing information security policies

by Barman, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
6. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).

Powered by Koha