//]]>
How to achieve 27001 certification : , an example of applied compliance management / by Arnason, Sigurjon Thor. Publication: New York : Auerbach Publications, 2008 . xx, 326 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
IT auditing : , using controls to protect information assets / by Davis, Chris Publication: New York : McGraw-Hill, 2011 . xxix, 480 p. : 24 cm. Date:2011 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
IT audit, control, and security / by Moeller, Robert R. Publication: Hoboken, N.J. : Wiley, 2010 . xxiv, 667 p. : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Computer security : , principles and practice / by Stallings, William. Publication: Upper Saddle River, N.J. : Pearson Education, 2008 . xvii, 798 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Auditing and security : , AS/400, NT, UNIX, networks, and disaster recovery plans / by Musaji, Yusufali F. Publication: New York : Wiley, 2001 . xxi, 530 p. ; 26 cm. Date:2001 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Digital rights management : , technological, economic, legal and political aspects /   Publication: Berlin : Springer, 2003 . xi, 805 p. ; 24 cm. Date:2003 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Certified Ethical Hacker (CEH) preparation guide : , lesson-based review of ethical hacking and penetration testing / by Sheikh, Ahmed Publication: Berkeley, CA : Apress L. P., 2021 . xxii, 205 p. : 24 cm. Date:2021 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية