|
|
How to achieve 27001 certification : , an example of applied compliance management /
by Arnason, Sigurjon Thor.
Publication:
New York : Auerbach Publications, 2008
. xx, 326 p. :
25 cm.
Date:2008
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
IT auditing : , using controls to protect information assets /
by Davis, Chris
Publication:
New York : McGraw-Hill, 2011
. xxix, 480 p. :
24 cm.
Date:2011
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
IT audit, control, and security /
by Moeller, Robert R.
Publication:
Hoboken, N.J. : Wiley, 2010
. xxiv, 667 p. :
26 cm.
Date:2010
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Computer security : , principles and practice /
by Stallings, William.
Publication:
Upper Saddle River, N.J. : Pearson Education, 2008
. xvii, 798 p. :
24 cm.
Date:2008
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Auditing and security : , AS/400, NT, UNIX, networks, and disaster recovery plans /
by Musaji, Yusufali F.
Publication:
New York : Wiley, 2001
. xxi, 530 p. ;
26 cm.
Date:2001
Availability:
Copies available:
AUM Main Library
(3),
|
|
|
Digital rights management : , technological, economic, legal and political aspects /
Publication:
Berlin : Springer, 2003
. xi, 805 p. ;
24 cm.
Date:2003
Availability:
Copies available:
AUM Main Library
(3),
|
|
|
Certified Ethical Hacker (CEH) preparation guide : , lesson-based review of ethical hacking and penetration testing /
by Sheikh, Ahmed
Publication:
Berkeley, CA : Apress L. P., 2021
. xxii, 205 p. :
24 cm.
Date:2021
Availability:
Copies available:
AUM Main Library
(1),
|
|