skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Index

Results 1 - 50 of 357  for Library Catalog (Excludes Articles)

Results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Securing SCADA systems
Material Type:
Book
Add to e-Shelf

Securing SCADA systems

Ronald L. Krutz 1938-

c2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TS 156.8 .K78 2005 )()

View 2 versions
2
Information assurance : security in the information environment
Material Type:
Book
Add to e-Shelf

Information assurance : security in the information environment

Andrew Blyth 1966- Gerald L Kovacich

2nd ed.. c2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 B59 2006 )()

3
Data protection and information lifecycle management
Material Type:
Book
Add to e-Shelf

Data protection and information lifecycle management

Thomas D. Petrocelli

c2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 P44 2006 )()

4
Security in computing
Material Type:
Book
Add to e-Shelf

Security in computing

Charles P. Pfleeger 1948- Shari Lawrence Pfleeger

3rd ed.. 2003

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 P45 2003 )()

View 2 versions
5
Information assurance for the enterprise : a roadmap to information security
Material Type:
Book
Add to e-Shelf

Information assurance for the enterprise : a roadmap to information security

Corey Schou Dan Shoemaker

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 S3523 2007 )()

6
Information security policies and procedures : a practitioner's reference
Material Type:
Book
Add to e-Shelf

Information security policies and procedures : a practitioner's reference

Thomas R. Peltier

2nd ed.. c2004

Check holdings()

7
Data privacy in the information age
Material Type:
Book
Add to e-Shelf

Data privacy in the information age

Jacqueline Klosek 1972-

2000

Online access

8
Mobile data loss : threats and countermeasures
Material Type:
Book
Add to e-Shelf

Mobile data loss : threats and countermeasures

Michael T. Raggo author.

2016

Online access

9
Microsoft Data Protection Manager 2010 a practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010
Material Type:
Book
Add to e-Shelf

Microsoft Data Protection Manager 2010 a practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010

Steve. Buchanan

2011

Online access

10
Advances in artificial intelligence for privacy protection and security
Material Type:
Book
Add to e-Shelf

Advances in artificial intelligence for privacy protection and security

Agusti Solanas; Antoni Martínez-Ballesté

c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 A38 2010 )()

View 2 versions
11
Information security management handbook
Material Type:
Book
Add to e-Shelf

Information security management handbook

Harold F Tipton; Micki Krause

6th ed.. c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 H36 2007 )()

View 2 versions
12
Data protection and consumer privacy an Emerald guide.
Material Type:
Book
Add to e-Shelf

Data protection and consumer privacy an Emerald guide.

c2004

Online access

13
Everyday cryptography fundamental principles and applications
Material Type:
Book
Add to e-Shelf

Everyday cryptography fundamental principles and applications

Keith M. Martin

2012

Online access

14
Surviving security : how to integrate people, process, and technology
Material Type:
Book
Add to e-Shelf

Surviving security : how to integrate people, process, and technology

Mandy. Andress

2nd ed.. 2004

Check holdings()

15
Investigator's guide to steganography
Material Type:
Book
Add to e-Shelf

Investigator's guide to steganography

Gregory Kipper

c2004

Check holdings()

16
Consumer data protection in Brazil, China and Germany a comparative study
Material Type:
Book
Add to e-Shelf

Consumer data protection in Brazil, China and Germany a comparative study

Rainer Metz editor.; Jörg Binding editor.; Pan Haifeng editor.; Florian Huber 1971-, editor.; German Federal Ministry of Justice and Consumer Protection, editor.; State Administration for Industry and Commerce of the People's Republic of China, editor.; National Consumer Secretariat, Ministry of Justice of the Federal Republic of Brazil, editor.; Deutsche Gesellschaft für Internationale Zusammenarbeit, editor.

2016

Online access

17
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
Material Type:
Book
Add to e-Shelf

Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

Ron Ben-Natan

c2005

Check holdings()

18
IBM InfoSphere a platform for big data governance and process data governance
Material Type:
Book
Add to e-Shelf

IBM InfoSphere a platform for big data governance and process data governance

Sunil. Soares ; Society for Human Resource Management (U.S.) Corporate Author

1st ed.. 2013

Online access

19
Governance, risk, and compliance handbook for Oracle applications
Material Type:
Book
Add to e-Shelf

Governance, risk, and compliance handbook for Oracle applications

Nigel. King Adil R Khan

2012

Online access

20
The chief information security officer : insights, tools and survival skills
Material Type:
Book
Add to e-Shelf

The chief information security officer : insights, tools and survival skills

Barry L. Kouns Jake Kouns

2011

Online access

21
The information systems security officer's guide establishing and managing an information protection program
Material Type:
Book
Add to e-Shelf

The information systems security officer's guide establishing and managing an information protection program

Gerald L. Kovacich

2nd ed.. c2003

Online access

22
Simple computer security disinfect your PC
Material Type:
Book
Add to e-Shelf

Simple computer security disinfect your PC

Eric Geier 1984-; James T Geier; Computer Associates International.

c2007

Online access

23
Advances in security information management perceptions and outcomes
Material Type:
Book
Add to e-Shelf

Advances in security information management perceptions and outcomes

Guillermo Suarez de Tangil; Esther Palomar

2013

Online access

24
Information governance and assurance : reducing risk, promoting policy
Material Type:
Book
Add to e-Shelf

Information governance and assurance : reducing risk, promoting policy

Alan Maclennan author.

2014

Online access

25
Material Type:
Book
Add to e-Shelf

Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols

Michael T. Raggo Chet Hosmer; ProQuest (Firm)

1st ed.. 2013

Online access

26
Information assurance and computer security
Material Type:
Book
Add to e-Shelf

Information assurance and computer security

NATO Advanced Research Workshop on Information Assurance and Computer Security Corporate Author ; NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco) Mohamed Essaaidi; Johnson P Thomas; NATO Advanced Research Workshop on Information Assurance and Computer Security

c2006

Online access

27
Material Type:
Book
Add to e-Shelf

IEEE-International Symposium on Biometrics & Security Technologies ISBAST '08, 23-24 April, 2008, Islamabad.

IEEE International Symposium on Biometrics & Security Technologies (2008 : Islāmābād, Pakistan)

c2008

Online access

28
Cryptology unlocked
Material Type:
Book
Add to e-Shelf

Cryptology unlocked

Reinhard Wobst

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 W62 2007 )()

29
Information security : a manager's guide to thwarting data thieves and hackers
Material Type:
Book
Add to e-Shelf

Information security : a manager's guide to thwarting data thieves and hackers

Philip Alexander 1963-

2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HF 5548.37 .A44 2008 )()

View 2 versions
30
The shellcoder's handbook : discovering and exploiting security holes
Material Type:
Book
Add to e-Shelf

The shellcoder's handbook : discovering and exploiting security holes

Chris Anley; Jack Koziol

2nd ed.. c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 S464 2007 )()

31
Surveillance as social sorting : privacy, risk, and digital discrimination
Material Type:
Book
Add to e-Shelf

Surveillance as social sorting : privacy, risk, and digital discrimination

David Lyon 1948-

2003

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (JC 596 .S796 2003 )()

View 2 versions
32
Assessing and managing security risk in IT systems : a structured methodology
Material Type:
Book
Add to e-Shelf

Assessing and managing security risk in IT systems : a structured methodology

John McCumber 1956-

2005

Check holdings()

33
Black hat physical device security exploiting hardware and software
Material Type:
Book
Add to e-Shelf

Black hat physical device security exploiting hardware and software

Drew. Miller

c2005

Online access

34
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Material Type:
Book
Add to e-Shelf

Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)

Mariemma Yagüe

c2007

Online access

35
Information security policy, processes, and practices
Material Type:
Book
Add to e-Shelf

Information security policy, processes, and practices

Detmar W Straub; Seymour E Goodman; Richard Baskerville

c2008

Online access

36
The data governance imperative a business strategy for corporate data.
Material Type:
Book
Add to e-Shelf

The data governance imperative a business strategy for corporate data.

Steve. Sarsfield

2009

Online access

37
Information security management principles
Material Type:
Book
Add to e-Shelf

Information security management principles

David. Alexander Amanda Finch; David Sutton; Andy Taylor

2nd ed.. 2013

Online access

38
Getting started with FortiGate
Material Type:
Book
Add to e-Shelf

Getting started with FortiGate

Rosato. Fabbri Fabrizio Volpe

2013

Online access

39
PCI DSS : a pocket guide
Material Type:
Book
Add to e-Shelf

PCI DSS : a pocket guide

Alan. Calder Nicki Carter

2nd ed.. 2011

Online access

40
Cyber infrastructure protection selected issues and analyses
Material Type:
Book
Add to e-Shelf

Cyber infrastructure protection selected issues and analyses

Howard Collins; Connor R Hughes

2013

Online access

41
Software security engineering design and applications
Material Type:
Book
Add to e-Shelf

Software security engineering design and applications

Muthu. Ramachandran

2012

Online access

42
Nine steps to succes : an ISO 27001: 2013 implementation overview
Material Type:
Book
Add to e-Shelf

Nine steps to succes : an ISO 27001: 2013 implementation overview

Alan Calder author.

3rd ed.. 2016

Online access

43
Data hiding techniques in Windows OS : a practical approach to investigation and defense
Material Type:
Book
Add to e-Shelf

Data hiding techniques in Windows OS : a practical approach to investigation and defense

Nihad Ahmad Hassan author. Rami Hijazi author.; Helvi Salminen author.

2017

Online access

44
A process for developing a common vocabulary in the information security area
Material Type:
Book
Add to e-Shelf

A process for developing a common vocabulary in the information security area

NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area Corporate Author ; NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) J. V Knop (Jan V.); Alexey A Salʹnikov; V. V I͡Ashchenko; NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area

c2007

Online access

45
Digital Futures Strategies for the Information Age
Material Type:
Book
Add to e-Shelf

Digital Futures Strategies for the Information Age

Marilyn. Deegan Simon Tanner

2013

Online access

46
Material Type:
Journal
Add to e-Shelf

Magdeburger Journal zur Sicherheitsforschung.

Magdeburger Institut für Sicherheitsforschung, issuing body.

2011]-

Online access

47
Material Type:
Journal
Add to e-Shelf

International journal of information security and privacy (Online)

2007

Online access

48
Material Type:
Journal
Add to e-Shelf

Tätigkeitsbericht des Hessischen Datenschutzbeauftragten ...

Hesse (Germany). Hessische Datenschutzbeauftragte.

Online access

49
Hacking exposed : network security secrets and solutions
Material Type:
Book
Add to e-Shelf

Hacking exposed : network security secrets and solutions

Stuart McClure George Kurtz; Joel Scambray

c1999

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .M33 1999 )()

50
The CISO handbook : a practical guide to securing your company
Material Type:
Book
Add to e-Shelf

The CISO handbook : a practical guide to securing your company

Michael. Gentile Ronald D Collette; Thomas D August

2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HF 5548.37 .G46 2006 )()

Results 1 - 50 of 357  for Library Catalog (Excludes Articles)

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit