Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • [Erscheinungsort nicht ermittelbar] : Auerbach Publications  (2)
  • Computer Security  (2)
Datasource
Material
Language
Years
  • 1
    ISBN: 9781466580596 , 1466580593
    Language: English
    Pages: 1 online resource (152 pages)
    Edition: 1st.
    Keywords: Access control ; Computer networks Access control ; Computer networks Security measures ; Computer security ; Computers Access control ; Data protection ; Computer Security ; Protection de l'information (Informatique) ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Réseaux d'ordinateurs ; Accès ; Contrôle ; Ordinateurs ; Accès ; Contrôle ; Computer networks ; Access control ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Data protection
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    ISBN: 9781420052862
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 658.4/78
    Keywords: Information technology Security measures ; Data protection ; Business enterprises Computer networks ; Security measures ; Computer security ; Computer Security ; Electronic books ; local ; Technologie de l'information ; Sécurité ; Mesures ; Protection de l'information (Informatique) ; Sécurité informatique ; Information technology ; Security measures ; Data protection ; Computer security ; Business enterprises ; Computer networks ; Security measures
    Abstract: Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr
    Note: Online resource; Title from title page (viewed March 30, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...