How to achieve 27001 certification : , an example of applied compliance management / by Arnason, Sigurjon Thor. Publication: New York : Auerbach Publications, 2008 . xx, 326 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Applied algebra : , codes, ciphers, and discrete algorithms / by Hardy, Darel W. Publication: Boca Raton, FL : CRC Press, 2009 . 410 p. : 24 cm. + Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information assurance architecture / by Willett, Keith D. Publication: Boca Raton, FL : CRC Press, 2008 . xxix, 588 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
IT security metrics : , a practical framework for measuring security & protecting data / by Hayden, Lance. Publication: New York : McGraw Hill, 2010 . xxvii, 368 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
IT auditing : , using controls to protect information assets / by Davis, Chris Publication: New York : McGraw-Hill, 2011 . xxix, 480 p. : 24 cm. Date:2011 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Software engineering for secure systems : , industrial and research perspectives /   Publication: Hershey, PA : Information Science Reference, 2011 . xvii, 370 p. : 29 cm. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security software development : , assessing and managing security risks / by Ashbaugh, Douglas A. Publication: Boca Raton, FL : CRC Press, 2009 . xvii, 313 p. : 25 cm. Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer security : , art and science / by Bishop, Matt Publication: Boston, MA : Addison-Wesley, 2003 . xli, 1084 p. : 24 cm. Date:2003 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Defense against the black arts : , how hackers do what they do and how to protect against it / by Varsalone, Jesse. Publication: Boca Raton, FL : CRC Press, 2012 . xvi, 396 p. : 26 cm. Date:2012 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Security metrics : , a beginner's guide / by Wong, Caroline. Publication: New York : McGraw-Hill, 2012 . xxxii, 397 p. : 24 cm. Date:2012 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Security in computing / by Pfleeger, Charles P., Publication: Upper Saddle River, N.J : Prentice Hall, 2007 . xxix, 845 p. : 25 cm. Date:2007 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Fuzzing for software security testing and quality assurance / by Takanen, Ari. Publication: Norwood, MA : Artech House, 2008 . xxii, 287 p. : 27 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mechanisms for autonomous management of networks and services : , 4th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2010, Zurich, Switzerland, June 23-25, 2010 : proceedings /   Publication: Berlin ; | New York : Springer, 2010 . xiii, 178 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering secure software and systems : , Second International Symposium, Essos 2010, Pisa, Italy, February 3-4, 2010, proceedings /   Publication: Berlin : Springer, 2010 . x, 240 p. : Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
System assurance : , beyond detecting vulnerabilities / by Mansourov, Nikolai Publication: Amsterdam : Elseiver, 2011 . xix, 346 p. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Enterprise information security and privacy /   Publication: Boston, MA : Artech House, 2009 . xxiv, 231 p. : Date:2009 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Intelligence and security informatics for international security : , Information sharing and data mining / by Chen, Hsinchum Publication: New York : Springer, 2006 . xvii, 182 p. : Date:2006 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security risk management body of knowledge / by Talbot, Julian. Publication: Hoboken, N.J. : Wiley, 2009 . xxiv, 445 p. Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Group policy : fundamentals, security, and the managed desktop / by Moskowitz, Jeremy. Publication: Indianapolis, Ind. : Wiley, 2010 . xxxii, 903 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Schneier on security / by Schneier, Bruce, Publication: Indianapolis, Ind. : Wiley, 2008 . viii, 328 p. ; 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>