Erweiterte Suche
Preis einschränken:

58,80 EUR*
Details The-IT-Regulatory-and-Standards-Compliance-Handbook-How-to-Survive-Information-Systems-Audit-and-Assessments

The IT Regulatory and Standards Compliance Handbook Presents a comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with ...

88,99 EUR*
Details Information-Systems-2E-wURL-A-Comprehensive-Reference-Guide

Auditing Information Systems Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with ...

44,81 EUR*
Details Physical-and-Logical-Security-Convergence-Powered-By-Enterprise-Security-Management

Physical and Logical Security Convergence Offers an explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in the changing security landscape ...

106,99 EUR*
Details The-Globalization-of-Security-State-Power-Security-Provision-and-Legitimacy-New-Security-Challenges

The Globalization of Security The Globalization of Security is an important rethinking of the connections between globalization and security, focusing on a conceptual examination of the role of the state combined with key case studies. The book ...

44,55 EUR*
Details Fiamma-Kit-Security-Lock-fr-Security-3146

Kit Security Lock Bestehend aus einem zusätzlichen Sicherheitsschloss. Zum Nachrüsten der Security 31 und 46 durch die Montage auf der Einstiegstür. Komplett mit Schlüssel und innerer Gegenhalterung. Aus weiß lackiertem Aluminium.

57,41 EUR*
Details Email-Security-with-Cisco-IronPort-Networking-Technology-Security

Email Security with Cisco Ironport Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's messaging environments and shows you how to systematically anticipate and respond to them ...

30,97 EUR*
Details Beautiful-Security-Leading-Security-Experts-Explain-How-They-Think

Beautiful Security An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design ...

102,16 EUR*
Details Technology-and-Security-Governing-Threats-in-the-New-Millennium-New-Security-Challenges

Technology and Security This book takes forward the existing state of academic understanding where security and technology intersect. It assesses the challenges posed by emerging scientific and technological developments for security while ...

80,99 EUR*
Details Security-Strategies-in-Linux-Platforms-and-Applications-Information-Systems-Security-Assurance

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is ...