Management of information security /Author: Whitman, Michael E.,
Publisher: Boston, MA : Cengage Learning,
Date: [2019] This title can be found in 1 Iowa libraries.
Penetration testing fundamentals : a hands-on guide to reliable security audits /Author: Easttom, Chuck.
Publisher: Indianapolis, Indian : Pearson,
Date: [2018] This title can be found in 1 Iowa libraries.
Investigating the cyber breach : the digital forensics guide for the network engineer /Author: Muniz, Joseph.
Publisher: Indianapolis, IN : Cisco Press,
Date: [2018] This title can be found in 1 Iowa libraries.
Cybersecurity incident response : how to contain, eradicate, and recover from incidents /Author: Thompson, Eric C.
Publisher: [Berkeley, California] : Apress,
Date: [2018] This title can be found in 1 Iowa libraries.
Management of information security /Author: Whitman, Michael E.,
Publisher: Stamford, CT : Cengage Learning,
Date: [2014] This title can be found in 1 Iowa libraries.
The true cost of information security breaches /Author: Krausz, Michael
Publisher: Ely, Cambridgeshire, U.K. : IT Governance Publishing,
Date: 2013. This title can be found in 1 Iowa libraries.
Readings and cases in information security : law and ethics /Author: Whitman, Michael E.,
Publisher: Boston, MA ; Course Technology Cengage Learning,
Date: c2011. This title can be found in 1 Iowa libraries.
Information security management : concepts and practice /Author: Raggad, Bel G.
Publisher: Boca Raton, FL : CRC Press/Taylor & Francis,
Date: c2010. This title can be found in 2 Iowa libraries.
Private sector perspectives on Department of Defense information technology and cybersecurity activities : hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held February 25, 2010.Publisher: Washington : U.S. G.P.O.,
Date: 2010. This title can be found in 1 Iowa libraries.
Harnessing small business innovation for national security cyber needs : hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010.Publisher: Washington : U.S. G.P.O.,
Date: 2010. This title can be found in 1 Iowa libraries.
Cyber-security and global information assurance : threat analysis and response solutions /Publisher: Hershey, PA : Information Science Reference,
Date: [2009] This title can be found in 1 Iowa libraries.
Disaster recovery and business continuity IT planning, implementation, management and testing of solutions and services workbook.Author: Blokdija, Gerald.
Publisher: [Australia? : Emereo Pty Ltd.],
Date: c2008. This title can be found in 1 Iowa libraries.
Principles of incident response and disaster recovery /Author: Whitman, Michael E.,
Publisher: Boston, Mass. : Thomson Course Technology,
Date: [2007] This title can be found in 1 Iowa libraries.
Readings and cases in the management of information security /Author: Whitman, Michael E.,
Publisher: Boston, Mass. : Thomson Course Technology,
Date: c2006. This title can be found in 1 Iowa libraries.
Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference /Publisher: New York, NY : Springer,
Date: c2005. This title can be found in 1 Iowa libraries.
Managing information security risks : the OCTAVE approach /Author: Alberts, Christopher J.
Publisher: Boston : Addison-Wesley,
Date: c2003. This title can be found in 1 Iowa libraries.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.