Showing
1 - 8
results of
8
Skip to content
Institutional Login
Language
English
Te reo Māori
Books & media
Combined Results
Books & media
Articles & more
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Page will reload when a filter is removed.
Applied Filters:
Suggested Topics:
Remove Filter
Business enterprises
AND
Remove Filter
Information technology
Page will reload when a filter is removed.
Show filters (2)
Suggested Topics:
Remove Filter
Business enterprises
AND
Remove Filter
Information technology
Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
Business enterprises
Information technology
Security measures
8
Computer networks
7
Data protection
7
Computer security
6
Risk management
3
Cloud computing
2
Management
2
Auditing
1
Confidential business information
1
Evaluation
1
Risk assessment
1
Standards
1
Showing
1 - 8
results of
8
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
IT security governance innovations : theory and research /
Published 2013
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
IGI Global e-Book Collection
Request this item
Save to List
Saved in:
Select result number 2
2
Information security management metrics : a definitive guide to effective security monitoring and measurement /
by
Brotby, W. Krag
Published 2009
Book
Loading…
Call Number:
Loading...
Located:
Loading...
Request this item
Save to List
Saved in:
Select result number 3
3
Advances in enterprise information technology security /
Published 2007
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
IGI Global e-Book Collection
Request this item
Save to List
Saved in:
Select result number 4
4
Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams /
by
Minoli, Daniel, 1952-
,
Kouns, Jake
Published 2010
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Click here to view this book
Request this item
Save to List
Saved in:
Select result number 5
5
Information technology risk management and compliance in modern organizations /
Published 2018
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
IGI Global e-Book Collection
Request this item
Save to List
Saved in:
Select result number 6
6
Information security management with ITIL version 3 /
by
Cazemier, Jacques A.
,
Overbeek, Paul L.
,
Peters, Louk M. C.
Published 2010
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Click here to view this book
Request this item
Save to List
Saved in:
Select result number 7
7
Auditing cloud computing : a security and privacy guide /
Published 2011
Book
Call Number:
Loading...
Located:
Loading...
Online:
Table of contents
Contributor biographical information
Request this item
Save to List
Saved in:
Select result number 8
8
Auditing cloud computing : a security and privacy guide /
Published 2011
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Click here to view this book
Request this item
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
RSS Feed
–
Email Search
–
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Location
Online
6 results
6
City campus
2 results
2
Shelving location
City campus main collection
2 results
2
Item type
Ebook
6 results
6
Book
2 results
2
Year of Publication
From:
To:
Items from Articles & more search
Protecting A Nuclear Power Plant Against A Stuxnet Attack: Power Of Computer Security
by
Thapliyal, Nachiket
, et al.
Visual Analysis of Computer Security Data Using Artificial Neural Networks
by
Zhernova, Ksenia
, et al.
Application of Computer Security Management in Internet Finance
by
Yu, Zhibin
Teaching Computer Security in a Secondary School
by
Mottl, J.
Design of Computer Security Algorithm Based on Differential Evolution and Analysis of Data Structure Discreteness
by
Chen, Xiaohai
, et al.
More results…