Explore: Electronic Data Processing Departments Security Measures
Discover books, insights, and more — all in one place.
Learn more about Electronic Data Processing Departments Security Measures with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “electronic-data-processing-departments-security-measures”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Computer Security Basics
By Deborah Russell, Sr. G.T Gangemi and Rick Lehtinen

“Computer Security Basics” Metadata:
- Title: Computer Security Basics
- Authors: Deborah RussellSr. G.T GangemiRick Lehtinen
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ O'Reilly & Associates - O'Reilly Media, Incorporated - O'Reilly - O'Reilly Media, Inc.
- Publish Date: 1991 - 1992 - 2006
- Publish Location: ➤ Sebastopol, Calif - Sebastopol, CA - Cambridge, MA
“Computer Security Basics” Subjects and Themes:
- Subjects: ➤ Computer security - Data security & data encryption - Privacy & data protection - Computers - Computer Data Security - Computers - Computer Security - Computer Books: General - Security - General - Computers / Computer Security - Computers / Security - Electronic data processing departments, security measures - Computer Security - Sécurité informatique - COMPUTERS - Security - General - Computadores (software) - Computer networks - Security measures - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: ➤ OL36799042M - OL17157910M - OL17455894M - OL36706430M - OL1237444M - OL24961154M - OL36717671M - OL8414532M - OL7581091M
- Online Computer Library Center (OCLC) ID: 44958507 - 71665969 - 664376113
- Library of Congress Control Number (LCCN): 94241137 - 93118560 - 2006287147
- All ISBNs: ➤ 9781449317423 - 9781449317058 - 9781306813495 - 1449317057 - 1306813492 - 0596006691 - 0937175714 - 9780596006693 - 9780937175712 - 1449317421
Access and General Info:
- First Year Published: 1991
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer Security Basics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Computer security
By Leonard H. Fine

“Computer security” Metadata:
- Title: Computer security
- Author: Leonard H. Fine
- Language: English
- Number of Pages: Median: 100
- Publisher: ➤ Irish Management Institute - Heinemann - Trafalgar Square Publishing - Heinemann in association with the Irish Management Institute
- Publish Date: 1983 - 1984 - 1986
- Publish Location: London - Dublin
“Computer security” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing departments - Management - Security measures - Electronic data processing departments, security measures - Electronic data processing departments, management
Edition Identifiers:
- The Open Library ID: OL17354564M - OL17497016M - OL2642662M - OL7507465M
- Online Computer Library Center (OCLC) ID: 13092107 - 17521483
- Library of Congress Control Number (LCCN): 85220105
- All ISBNs: ➤ 043490578X - 9780434905799 - 9780434905782 - 0434905798 - 0903352362 - 9780903352369
Access and General Info:
- First Year Published: 1983
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Computer-security technology
By James Arlin Cooper

“Computer-security technology” Metadata:
- Title: Computer-security technology
- Author: James Arlin Cooper
- Language: English
- Number of Pages: Median: 166
- Publisher: LexingtonBooks
- Publish Date: 1984
- Publish Location: Lexington, Mass
“Computer-security technology” Subjects and Themes:
- Subjects: ➤ Computer securities - Electronic data processing departments - Security measures - Computer security - Ordinateurs - Accès - Contrôle - Centres de traitement de l'information - Sûreté - Mesures - Datensicherung - Computers - Veiligheid - Computers, access control - Electronic data processing departments, security measures - Access control
Edition Identifiers:
- The Open Library ID: OL3507745M
- Online Computer Library Center (OCLC) ID: 9249691
- Library of Congress Control Number (LCCN): 82049206
- All ISBNs: 9780669064360 - 066906436X
Access and General Info:
- First Year Published: 1984
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer-security technology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Corporate Computer and Network Security
By Raymond R. Panko
“Corporate Computer and Network Security” Metadata:
- Title: ➤ Corporate Computer and Network Security
- Author: Raymond R. Panko
- Language: English
- Number of Pages: Median: 544
- Publisher: ➤ Pearson Education, Limited - Pearson Academic
- Publish Date: 2003 - 2009 - 2010
“Corporate Computer and Network Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL29210186M - OL28964315M - OL29044334M
- All ISBNs: ➤ 9780131211919 - 9781282693074 - 9780136121572 - 1282693077 - 0136121578 - 0131211919
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Corporate Computer and Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5The computer virus crisis
By Philip E. Fites, Peter Johnston and Martin P. J. Kratz

“The computer virus crisis” Metadata:
- Title: The computer virus crisis
- Authors: Philip E. FitesPeter JohnstonMartin P. J. Kratz
- Language: English
- Number of Pages: Median: 171
- Publisher: Van Nostrand Reinhold
- Publish Date: 1989 - 1992
- Publish Location: New York
“The computer virus crisis” Subjects and Themes:
- Subjects: ➤ Computer viruses - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL2037223M - OL14428739M - OL1542326M
- Online Computer Library Center (OCLC) ID: 23975709 - 18416763
- Library of Congress Control Number (LCCN): 88013496 - 91021163
- All ISBNs: 0442285329 - 0442006497 - 9780442285326 - 0442258329 - 9780442006495
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The computer virus crisis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Management guide to computer security
By J. R. Talbot

“Management guide to computer security” Metadata:
- Title: ➤ Management guide to computer security
- Author: J. R. Talbot
- Language: English
- Number of Pages: Median: 180
- Publisher: Wiley - Gower
- Publish Date: 1981
- Publish Location: ➤ Farnborough, Hants, Eng - New York
“Management guide to computer security” Subjects and Themes:
- Subjects: ➤ Access control - Computer security - Computers - Electronic data processing departments - Security measures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL22121106M - OL4259397M
- Online Computer Library Center (OCLC) ID: 7284122
- Library of Congress Control Number (LCCN): 81004982
- All ISBNs: 0470271426 - 9780566021909 - 0566021900 - 9780470271421
Access and General Info:
- First Year Published: 1981
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Management guide to computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Hands-On Information Security Lab Manual
By Michael E. Whitman and Dave M. Shackleford

“Hands-On Information Security Lab Manual” Metadata:
- Title: ➤ Hands-On Information Security Lab Manual
- Authors: Michael E. WhitmanDave M. Shackleford
- Language: English
- Number of Pages: Median: 400
- Publisher: Custom Publishing
- Publish Date: 2002
“Hands-On Information Security Lab Manual” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL10897124M
- Online Computer Library Center (OCLC) ID: 55022703
- All ISBNs: 0759312834 - 9780759312838
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hands-On Information Security Lab Manual at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Computer data security
By Harry Katzan

“Computer data security” Metadata:
- Title: Computer data security
- Author: Harry Katzan
- Language: English
- Number of Pages: Median: 223
- Publisher: Van Nostrand Reinhold
- Publish Date: 1973
- Publish Location: New York
“Computer data security” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Electronic data processing departments - Security measures - Informatique - Sûreté - Mesures - Centres de traitement de l'information - Datenschutz - Electronic data processing departments, security measures - Computer security
Edition Identifiers:
- The Open Library ID: OL5415118M
- Online Computer Library Center (OCLC) ID: 622659
- Library of Congress Control Number (LCCN): 73006872
- All ISBNs: 0442242581 - 9780442242589
Access and General Info:
- First Year Published: 1973
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer data security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Security for computer networks
By Donald Watts Davies

“Security for computer networks” Metadata:
- Title: Security for computer networks
- Author: Donald Watts Davies
- Language: English
- Number of Pages: Median: 382
- Publisher: Wiley - John Wiley & Sons Ltd
- Publish Date: 1984 - 1989
- Publish Location: ➤ Chichester [England] - Chichester [West Sussex] - New York
“Security for computer networks” Subjects and Themes:
- Subjects: Data transmission systems - Security measures - Computer networks - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL2841767M - OL2195264M
- Online Computer Library Center (OCLC) ID: 10507727
- Library of Congress Control Number (LCCN): 84003662 - 89014760
- All ISBNs: 047190063X - 0471921378 - 9780471921370 - 9780471900634
Access and General Info:
- First Year Published: 1984
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Security for computer networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Security, accuracy, and privacy in computer systems
By James Martin

“Security, accuracy, and privacy in computer systems” Metadata:
- Title: ➤ Security, accuracy, and privacy in computer systems
- Author: James Martin
- Language: English
- Number of Pages: Median: 626
- Publisher: Prentice-Hall
- Publish Date: 1973
- Publish Location: Englewood Cliffs, N.J
“Security, accuracy, and privacy in computer systems” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Electronic data processing departments - Privacy, Right of - Right of Privacy - Security measures - Computers, access control - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL21352847M - OL5421500M
- Online Computer Library Center (OCLC) ID: 703105
- Library of Congress Control Number (LCCN): 73014961
- All ISBNs: 9780137989911 - 0137989911
Access and General Info:
- First Year Published: 1973
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Security, accuracy, and privacy in computer systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Computer security management
By Donn B. Parker

“Computer security management” Metadata:
- Title: Computer security management
- Author: Donn B. Parker
- Language: English
- Number of Pages: Median: 308
- Publisher: Reston Pub. Co.
- Publish Date: 1981
- Publish Location: Reston, Va
“Computer security management” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Computers - Access control - Electronic data processing departments, security measures - Computers, access control - Security measures
Edition Identifiers:
- The Open Library ID: OL4255475M
- Online Computer Library Center (OCLC) ID: 7282136
- Library of Congress Control Number (LCCN): 81000823
- All ISBNs: 0835909050 - 9780835909051
Access and General Info:
- First Year Published: 1981
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer security management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Security standards for data processing
By Susan Wooldridge

“Security standards for data processing” Metadata:
- Title: ➤ Security standards for data processing
- Author: Susan Wooldridge
- Language: English
- Number of Pages: Median: 186
- Publisher: Macmillan - Wiley
- Publish Date: 1973
- Publish Location: New York - [London]
“Security standards for data processing” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Security measures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL5412620M - OL5466831M
- Library of Congress Control Number (LCCN): 73003759 - 73169708
- All ISBNs: 0470961018 - 9780333149607 - 0333149602
Access and General Info:
- First Year Published: 1973
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Security standards for data processing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Computer fraud and countermeasures
By Leonard I. Krauss

“Computer fraud and countermeasures” Metadata:
- Title: ➤ Computer fraud and countermeasures
- Author: Leonard I. Krauss
- Language: English
- Number of Pages: Median: 509
- Publisher: Prentice-Hall
- Publish Date: 1979
- Publish Location: Englewood Cliffs, N.J
“Computer fraud and countermeasures” Subjects and Themes:
- Subjects: ➤ Access control - Computer crimes - Computer security - Computers - Electronic data processing departments - Fraud - Security measures - Electronic data processing departments, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL21084610M - OL4726024M
- Online Computer Library Center (OCLC) ID: 4136017
- Library of Congress Control Number (LCCN): 78013730
- All ISBNs: 9780131647725 - 0131647725
Access and General Info:
- First Year Published: 1979
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer fraud and countermeasures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Security evaluation for small computer centers

“Security evaluation for small computer centers” Metadata:
- Title: ➤ Security evaluation for small computer centers
- Language: English
- Number of Pages: Median: 159
- Publisher: QED Information Sciences
- Publish Date: 1985
- Publish Location: Wellesley, Mass
“Security evaluation for small computer centers” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Computers - Security measures - Access control - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL2554568M
- Library of Congress Control Number (LCCN): 85060178
- All ISBNs: 0894351540 - 9780894351549
Access and General Info:
- First Year Published: 1985
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Security evaluation for small computer centers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Computer crime
By Gerald McKnight

“Computer crime” Metadata:
- Title: Computer crime
- Author: Gerald McKnight
- Language: English
- Number of Pages: Median: 221
- Publisher: Joseph - Walker
- Publish Date: 1973 - 1974
- Publish Location: New York - London
“Computer crime” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Computer crimes - Security measures - Case studies - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL5475339M - OL5443453M
- Online Computer Library Center (OCLC) ID: 797346
- Library of Congress Control Number (LCCN): 73178671 - 73093937
- All ISBNs: 0802704425 - 9780802704429 - 9780718111786 - 0718111788
Access and General Info:
- First Year Published: 1973
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer crime at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Security for computer systems
By M. A. L. Farr

“Security for computer systems” Metadata:
- Title: Security for computer systems
- Author: M. A. L. Farr
- Language: English
- Number of Pages: Median: 172
- Publisher: ➤ Imprint unknown - National Computing Centre
- Publish Date: 1972
- Publish Location: [Manchester]
“Security for computer systems” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Security measures - Information, Services de traitement électronique de l' - Mesures de sécurité - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL5456925M
- Online Computer Library Center (OCLC) ID: 622932
- Library of Congress Control Number (LCCN): 73159240
- All ISBNs: 0850120772 - 9780850120776
Access and General Info:
- First Year Published: 1972
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Security for computer systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Information Security
By Mark Stamp

“Information Security” Metadata:
- Title: Information Security
- Author: Mark Stamp
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons Canada, Limited, John - John Wiley & Sons, Ltd. - Wiley-Interscience - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2005 - 2006 - 2007 - 2011 - 2021 - 2022
- Publish Location: Hoboken, N.J - New York
“Information Security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer security - Nonfiction - Electronic data processing departments, security measures - Sécurité informatique - Ordinateurs - Accès - Contrôle - Logiciels - Protection - Protocoles de réseaux d'ordinateurs - Sécurité - Mesures - Cryptographie - Databescherming - Informatiesystemen - Computersicherheit - Datensicherung - Kommunikationsprotokoll - Kryptologie - Malware - Zugriffskontrolle - Data protection - Computer Security - Qa76.9.a25 s69 2006 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL48712508M - OL48647918M - OL39897508M - OL34977085M - OL33919263M - OL33919251M - OL33642192M - OL29229520M - OL29065438M - OL29065437M - OL9527643M - OL7620834M - OL24253402M - OL15978508M
- Online Computer Library Center (OCLC) ID: 57754240 - 85820655
- Library of Congress Control Number (LCCN): 2005005152
- All ISBNs: ➤ 1119505879 - 1119505887 - 1118027965 - 9781119505891 - 1283138875 - 1119505895 - 9780471744184 - 0470242442 - 9781283138871 - 9781280241444 - 0471744190 - 9780470242445 - 0471738484 - 1118027957 - 1280241446 - 1118027973 - 9781119505907 - 9781118027967 - 9780471738480 - 9781118027974 - 1119505909 - 0471744182 - 9781118027950 - 9781119505884 - 9781119505877 - 9780471744191
First Setence:
"The basic terminology of crypto includes the following."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Computer security handbook
By Seymour Bosworth and Michel E. Kabay

“Computer security handbook” Metadata:
- Title: Computer security handbook
- Authors: Seymour BosworthMichel E. Kabay
- Language: English
- Number of Pages: Median: 1224
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - John Wiley & Sons
- Publish Date: ➤ 2002 - 2008 - 2009 - 2012 - 2014
- Publish Location: New York
“Computer security handbook” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Security measures - Electronic data processing departments, security measures - Computer security
Edition Identifiers:
- The Open Library ID: ➤ OL44112712M - OL40007704M - OL40001217M - OL39889142M - OL39887142M - OL29169562M - OL3582769M
- Library of Congress Control Number (LCCN): 2002279890
- All ISBNs: ➤ 9781118134115 - 9781283656276 - 1118134109 - 9780471716532 - 9780470413753 - 9781118134108 - 0470313366 - 0471716537 - 0470413751 - 1283656272 - 1118134117 - 0471412589 - 9780470313367 - 9780471412588
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Computer security handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Cyber-threats, information warfare, and critical infrastructure protection
Defending the U.S. Homeland
By Anthony H. Cordesman and Justin G. Cordesman

“Cyber-threats, information warfare, and critical infrastructure protection” Metadata:
- Title: ➤ Cyber-threats, information warfare, and critical infrastructure protection
- Authors: Anthony H. CordesmanJustin G. Cordesman
- Language: English
- Number of Pages: Median: 195
- Publisher: ➤ Praeger - ABC-CLIO, LLC - Praeger Publishers
- Publish Date: 2001 - 2002
- Publish Location: Westport, Conn
“Cyber-threats, information warfare, and critical infrastructure protection” Subjects and Themes:
- Subjects: ➤ Telecommunication - Computer networks - Electronic data processing - Information warfare - Security measures - Defense measures - Military intelligence - Other warfare & defence issues - Political Science - Politics / Current Events - Politics/International Relations - USA - Data Transmission Systems - General - International Relations - General - Public Policy - Social Services & Welfare - Political Science / International Relations - Computer networks - Defense measures - Electronic data processing - Security measures - Telecommunication - United States - Electronic data processing departments, security measures - Telecommunication, data processing - Computer networks, security measures - United states, defenses
- Places: United States
Edition Identifiers:
- The Open Library ID: OL9525426M - OL48145090M - OL15504668M
- Online Computer Library Center (OCLC) ID: 47208462
- Library of Congress Control Number (LCCN): 2001036311
- All ISBNs: 9781280373862 - 9780275974237 - 0275974235 - 1280373865
First Setence:
"There is nothing new about critical infrastructure protection."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber-threats, information warfare, and critical infrastructure protection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20WHOIS running the Internet
By Garth O. Bruen

“WHOIS running the Internet” Metadata:
- Title: WHOIS running the Internet
- Author: Garth O. Bruen
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - John Wiley and Sons, Inc.
- Publish Date: 2015 - 2016
“WHOIS running the Internet” Subjects and Themes:
- Subjects: ➤ WHOIS (Computer network protocol) - Internet domain names - Right of Privacy - Government policy - COMPUTERS / Information Technology - Computer security - Internet, security measures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL39937810M - OL27206045M - OL29233696M - OL29233783M
- Online Computer Library Center (OCLC) ID: 875249232
- Library of Congress Control Number (LCCN): 2015025590 - 2015020393
- All ISBNs: ➤ 9781118985786 - 9781118985762 - 9781118985779 - 1118679555 - 9781118679555 - 1118985761 - 1118985788 - 111898577X
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find WHOIS running the Internet at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Data & computer security
By Dennis Longley and Michael Shain

“Data & computer security” Metadata:
- Title: Data & computer security
- Authors: Dennis LongleyMichael Shain
- Language: English
- Number of Pages: Median: 428
- Publisher: ➤ Stockton Press - Macmillan - Palgrave Macmillan
- Publish Date: 1987 - 1989
- Publish Location: ➤ Basingstoke - London - New York, N.Y
“Data & computer security” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Dictionaries - Electronic data processing departments - Security measures - Data security & data encryption - Privacy & data protection - Reference works - Electronic data processing departments, security measures - Electronic data processing, dictionaries - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL34530113M - OL10549267M - OL21293486M - OL2388847M - OL14998447M
- Online Computer Library Center (OCLC) ID: 16577665
- Library of Congress Control Number (LCCN): 87018024
- All ISBNs: ➤ 9780935859171 - 0333429354 - 9780333429358 - 0333511786 - 9780333511787 - 9781349111701 - 1349111708 - 0935859179
Access and General Info:
- First Year Published: 1987
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data & computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Computer Security Handbook
By Seymour Bosworth

“Computer Security Handbook” Metadata:
- Title: Computer Security Handbook
- Author: Seymour Bosworth
- Language: English
- Number of Pages: Median: 1424
- Publisher: ➤ John Wiley & Sons, Ltd. - John Wiley & Sons Inc - Wiley - John Wiley & Sons
- Publish Date: 2002 - 2008 - 2009
- Publish Location: New York - Hoboken, N.J
“Computer Security Handbook” Subjects and Themes:
- Subjects: ➤ Business - Nonfiction - Electronic data processing departments - Leadership - Corporate Governance - Workplace Culture - Security measures - BUSINESS & ECONOMICS - Organizational Development - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL10334860M - OL22560185M - OL24297279M
- Online Computer Library Center (OCLC) ID: 148798026 - 827738881
- Library of Congress Control Number (LCCN): 2008040626
- All ISBNs: ➤ 9780470327227 - 9780471269755 - 0470327227 - 0470327235 - 0471269751 - 0471716529 - 9780471716525 - 9780470327234
First Setence:
"The growth of computers and of information technology has been explosive."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security Handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Information security for managers
By William Caelli

“Information security for managers” Metadata:
- Title: ➤ Information security for managers
- Author: William Caelli
- Language: English
- Number of Pages: Median: 430
- Publisher: ➤ Macmillan Publishers Limited - Palgrave Macmillan - Stockton Press
- Publish Date: 1989
- Publish Location: New York
“Information security for managers” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing departments - Security measures - Electronic data processing departments, security measures - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL30552904M - OL2186556M - OL37254632M - OL44106962M
- Online Computer Library Center (OCLC) ID: 19629546
- Library of Congress Control Number (LCCN): 89004614
- All ISBNs: ➤ 9781349101399 - 1349101370 - 0333462033 - 093585973X - 9780333462034 - 9781349101375 - 9780935859737 - 1349101397
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security for managers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Computer security
By John Millar Carroll

“Computer security” Metadata:
- Title: Computer security
- Author: John Millar Carroll
- Language: English
- Number of Pages: Median: 446
- Publisher: ➤ Butterworth-Heinemann - Security World Pub. Co. - Butterworths
- Publish Date: 1977 - 1987 - 1996
- Publish Location: ➤ Boston - Boston, Mass - Los Angeles
“Computer security” Subjects and Themes:
- Subjects: ➤ Computer crimes - Computer security - Electronic data processing departments - Security measures - Computers - Access control - Computerkriminalitat - Crimes par ordinateur - Surete - Securite informatique - Computersicherheit - Systemes informatiques - Mesures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL1273388M - OL4543361M - OL2735517M
- Online Computer Library Center (OCLC) ID: 262587274
- Library of Congress Control Number (LCCN): 86029901 - 77010615 - 95004797
- All ISBNs: ➤ 9780913708286 - 9780409900323 - 9780750696005 - 040990032X - 0750696001 - 0913708283
Access and General Info:
- First Year Published: 1977
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Computer Security Handbook, Set
By Seymour Bosworth, M. E. Kabay and Eric Whyne
“Computer Security Handbook, Set” Metadata:
- Title: ➤ Computer Security Handbook, Set
- Authors: Seymour BosworthM. E. KabayEric Whyne
- Language: English
- Number of Pages: Median: 2000
- Publisher: ➤ Wiley & Sons, Incorporated, John
- Publish Date: 2012 - 2014
“Computer Security Handbook, Set” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL29132408M - OL39913837M - OL29231256M - OL29223518M
- All ISBNs: ➤ 1306533201 - 9781118851746 - 0470413743 - 111885179X - 9780470413746 - 9781118851791 - 9781306533201 - 1118851749
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Computer Security Handbook, Set at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Corporate Computer Security, Global Edition
By Randall J. Boyle and Raymond R. Panko

“Corporate Computer Security, Global Edition” Metadata:
- Title: ➤ Corporate Computer Security, Global Edition
- Authors: Randall J. BoyleRaymond R. Panko
- Language: English
- Number of Pages: Median: 673
- Publisher: ➤ Pearson Higher Education & Professional Group - Pearson Education, Limited
- Publish Date: 2014 - 2015
“Corporate Computer Security, Global Edition” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Electronic data processing departments, security measures - Computer networks - Security measures - Electronic data processing departments
Edition Identifiers:
- The Open Library ID: OL29296246M - OL28537141M
- All ISBNs: 9781322665887 - 9781292060453 - 1322665885 - 129206045X
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Corporate Computer Security, Global Edition at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Information Security
By Urs E. Gattiker
“Information Security” Metadata:
- Title: Information Security
- Author: Urs E. Gattiker
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ Wiley & Sons, Incorporated, John - John Wiley & Sons
- Publish Date: 2005 - 2007 - 2010
“Information Security” Subjects and Themes:
- Subjects: ➤ Risk management - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL29103788M - OL10296546M - OL39829241M
- All ISBNs: ➤ 9780470859063 - 0470859075 - 9780470859070 - 0470859067 - 9780470859056 - 0470859059
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28The disaster recovery handbook
By Michael Wallace

“The disaster recovery handbook” Metadata:
- Title: The disaster recovery handbook
- Author: Michael Wallace
- Language: English
- Number of Pages: Median: 398
- Publisher: ➤ American Management Association
- Publish Date: 2004
- Publish Location: New York
“The disaster recovery handbook” Subjects and Themes:
- Subjects: ➤ Emergency management - Crisis management - Data protection - Planning - Business planning - Handbooks, manuals - Computer security - Data recovery (Computer science) - Electronic data processing departments, security measures - Risk management
Edition Identifiers:
- The Open Library ID: OL24967055M
- Online Computer Library Center (OCLC) ID: 54460817
- Library of Congress Control Number (LCCN): 2009659432 - 2004003905
- All ISBNs: 0814472400 - 9780814472408
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The disaster recovery handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Corporate Computer Security
By Randy J. Boyle and Raymond R. Panko

“Corporate Computer Security” Metadata:
- Title: Corporate Computer Security
- Authors: Randy J. BoyleRaymond R. Panko
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ Pearson Education, Limited - Pearson
- Publish Date: 2011 - 2013 - 2014
“Corporate Computer Security” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Electronic data processing departments, security measures - Computer networks - Security measures - Electronic data processing departments
Edition Identifiers:
- The Open Library ID: OL28324641M - OL29110778M - OL29185161M
- Library of Congress Control Number (LCCN): 2013047309
- All ISBNs: ➤ 0132599023 - 9780133545197 - 0133545199 - 9780132599023 - 1292039639 - 9781292039633
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Corporate Computer Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Managing Risk in Information Systems
By Melody Carlson

“Managing Risk in Information Systems” Metadata:
- Title: ➤ Managing Risk in Information Systems
- Author: Melody Carlson
- Language: English
- Number of Pages: Median: 452
- Publisher: ➤ Jones & Bartlett Learning - Jones & Bartlett Publishers, Incorporated
- Publish Date: 2010
- Publish Location: Sudbury
“Managing Risk in Information Systems” Subjects and Themes:
- Subjects: ➤ Electronic information resources - Computer security - Access control - Electronic data processing departments, security measures - Data processing service centers
Edition Identifiers:
- The Open Library ID: OL25561234M
- Online Computer Library Center (OCLC) ID: 650217964
- Library of Congress Control Number (LCCN): 2010484330
- All ISBNs: 0763791873 - 9780763791872
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Managing Risk in Information Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31A Handbook of Computer Security
By Keith Hearnden
“A Handbook of Computer Security” Metadata:
- Title: ➤ A Handbook of Computer Security
- Author: Keith Hearnden
- Number of Pages: Median: 212
- Publisher: Kogan Page Ltd - Kogan Page
- Publish Date: 1987 - 1989
“A Handbook of Computer Security” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments, security measures - Electronic data processing departments, management
Edition Identifiers:
- The Open Library ID: OL10767333M - OL11948566M
- All ISBNs: 9781850913481 - 185091348X - 9780749400682 - 0749400684
Access and General Info:
- First Year Published: 1987
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find A Handbook of Computer Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Managing Information Security
By John R. Vacca

“Managing Information Security” Metadata:
- Title: Managing Information Security
- Author: John R. Vacca
- Language: English
- Number of Pages: Median: 346
- Publisher: ➤ Syngress - Elsevier Science & Technology Books
- Publish Date: 2010 - 2013
“Managing Information Security” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing departments, security measures - Computer networks, security measures - Management - Electronic data processing departments - Security measures - Computer networks - Penetration testing (Computer security)
Edition Identifiers:
- The Open Library ID: OL28514182M - OL34445621M
- Online Computer Library Center (OCLC) ID: 865474318
- Library of Congress Control Number (LCCN): 2014412845
- All ISBNs: 1597495344 - 9780124166882 - 0124166881 - 9781597495349
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Managing Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Computer Security
By J. A. Pritchard
“Computer Security” Metadata:
- Title: Computer Security
- Author: J. A. Pritchard
- Language: English
- Publisher: ➤ Wiley & Sons, Incorporated, John
- Publish Date: 1979 - 1980
“Computer Security” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL39971416M - OL39972444M
- All ISBNs: 0471894982 - 9780471894988 - 0471894346 - 9780471894346
Access and General Info:
- First Year Published: 1979
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Computer Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Sicherheitsstrategien in der Informationsverarbeitung
By Dirk Stelzer

“Sicherheitsstrategien in der Informationsverarbeitung” Metadata:
- Title: ➤ Sicherheitsstrategien in der Informationsverarbeitung
- Author: Dirk Stelzer
- Language: ger
- Number of Pages: Median: 378
- Publisher: ➤ Deutscher Universitäts Verlag - Deutscher Universitäts Verlag
- Publish Date: 1993 - 2013
- Publish Location: Wiesbaden
“Sicherheitsstrategien in der Informationsverarbeitung” Subjects and Themes:
- Subjects: ➤ Access control - Computer security - Computers - Electronic data processing departments - Planning - Security measures - Electronic data processing departments, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL37216530M - OL1518068M
- Library of Congress Control Number (LCCN): 93203817
- All ISBNs: 9783663145561 - 3824420384 - 9783824420384 - 3663145565
Access and General Info:
- First Year Published: 1993
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Sicherheitsstrategien in der Informationsverarbeitung at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Introduction to data security and controls
By Edward R. Buck

“Introduction to data security and controls” Metadata:
- Title: ➤ Introduction to data security and controls
- Author: Edward R. Buck
- Language: English
- Number of Pages: Median: 247
- Publisher: ➤ Q.E.D. Information Sciences - QED Technical Pub. Group
- Publish Date: 1982 - 1991
- Publish Location: Wellesley, Mass - Boston
“Introduction to data security and controls” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Electronic data processing departments - Security measures - Electronic data processing departments, security measures - Computer security
Edition Identifiers:
- The Open Library ID: OL1534508M - OL3509969M
- Online Computer Library Center (OCLC) ID: 9447261
- Library of Congress Control Number (LCCN): 91012351 - 82062128
- All ISBNs: 9780894353833 - 0894350625 - 9780894350627 - 0894353837
Access and General Info:
- First Year Published: 1982
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Introduction to data security and controls at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Protecting business information
By James A. Schweitzer

“Protecting business information” Metadata:
- Title: ➤ Protecting business information
- Author: James A. Schweitzer
- Language: English
- Number of Pages: Median: 199
- Publisher: Butterworth-Heinemann
- Publish Date: 1996
- Publish Location: Boston
“Protecting business information” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Trade secrets - Information resources management - Business intelligence - Data protection - Computer security - Security measures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL1277824M
- Library of Congress Control Number (LCCN): 95009549
- All ISBNs: 0750696583 - 9780750696586
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Protecting business information at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz
By Andreas Pfitzmann
“Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz” Metadata:
- Title: ➤ Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz
- Author: Andreas Pfitzmann
- Language: ger
- Number of Pages: Median: 343
- Publisher: ➤ Springer-Verlag - Springer London, Limited
- Publish Date: 1990 - 2013
- Publish Location: Berlin - New York
“Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Electronic data processing departments - Security measures - Electronic data processing departments, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL1955249M - OL37221116M
- Library of Congress Control Number (LCCN): 90183319
- All ISBNs: ➤ 9780387523279 - 3642755445 - 9783642755446 - 9783540523277 - 0387523278 - 3540523278
Access and General Info:
- First Year Published: 1990
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38People and security
By Tony Squires
“People and security” Metadata:
- Title: People and security
- Author: Tony Squires
- Language: English
- Number of Pages: Median: 59
- Publisher: ➤ National Computing Centre - NCC
- Publish Date: 1980 - 1984
- Publish Location: ➤ (Manchester) - [Manchester, Eng.]
“People and security” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing departments - Security measures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL19359934M - OL4166054M
- Library of Congress Control Number (LCCN): 80148080
- All ISBNs: 9780850122374 - 0850122376
Access and General Info:
- First Year Published: 1980
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find People and security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Federal Cybersecurity Planning
By Kurk C. Moore and Marion D. Taylor
“Federal Cybersecurity Planning” Metadata:
- Title: Federal Cybersecurity Planning
- Authors: Kurk C. MooreMarion D. Taylor
- Language: English
- Number of Pages: Median: 100
- Publisher: ➤ Nova Science Publishers, Incorporated
- Publish Date: 2012
“Federal Cybersecurity Planning” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing personnel - Electronic data processing departments, security measures - Electronic data processing departments - Cyber intelligence (Computer security) - Government policy - Recruiting - Computer science - Security measures
Edition Identifiers:
- The Open Library ID: OL29114173M
- Library of Congress Control Number (LCCN): 2012454437
- All ISBNs: 1619427699 - 9781619427693
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Federal Cybersecurity Planning at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Distributed Systems Security
By Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan and Srinivas Padmanabhuni
“Distributed Systems Security” Metadata:
- Title: Distributed Systems Security
- Authors: Abhijit BelapurkarAnirban ChakrabartiHarigopal PonnapalliNiranjan VaradarajanSrinivas Padmanabhuni
- Language: English
- Number of Pages: Median: 334
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2009
“Distributed Systems Security” Subjects and Themes:
- Subjects: ➤ Electronic data processing, distributed processing - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL33386984M - OL29027715M
- All ISBNs: 0470751789 - 0470751770 - 9780470751770 - 9780470751787
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Distributed Systems Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41The ultimate computer security survey
By James L. Schaub

“The ultimate computer security survey” Metadata:
- Title: ➤ The ultimate computer security survey
- Author: James L. Schaub
- Language: English
- Number of Pages: Median: 118
- Publisher: ➤ Butterworth-Heinemann - Elsevier Science & Technology Books
- Publish Date: 1995 - 2014
- Publish Location: Boston
“The ultimate computer security survey” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Computer crimes - Security measures - Prevention - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL40433701M - OL791618M
- Online Computer Library Center (OCLC) ID: 32747004
- Library of Congress Control Number (LCCN): 95024149
- All ISBNs: 9781483296500 - 1483296504 - 9780750696920 - 0750696923
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The ultimate computer security survey at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Cloud Security Ecosystem
By Ryan Ko and Raymond Choo

“Cloud Security Ecosystem” Metadata:
- Title: Cloud Security Ecosystem
- Authors: Ryan KoRaymond Choo
- Language: English
- Number of Pages: Median: 570
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2015
“Cloud Security Ecosystem” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments, security measures - Electronic data processing, distributed processing - Cloud computing - Security measures - Electronic data processing - Distributed processing - Internet
Edition Identifiers:
- The Open Library ID: OL29241491M - OL28566274M
- Online Computer Library Center (OCLC) ID: 900028079
- All ISBNs: 9780128017807 - 9780128015957 - 0128015950 - 0128017805
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cloud Security Ecosystem at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Disaster Recovery
By Rajib Shaw
“Disaster Recovery” Metadata:
- Title: Disaster Recovery
- Author: Rajib Shaw
- Language: English
- Publisher: ➤ Springer London, Limited - Springer Japan
- Publish Date: 2013 - 2016
“Disaster Recovery” Subjects and Themes:
- Subjects: ➤ Emergency management - Risk management - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL37269523M - OL35513142M
- All ISBNs: 9784431561354 - 4431542558 - 4431561358 - 9784431542551
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Disaster Recovery at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Advances in Computer Security Management
By Marvin M. Wofsey
“Advances in Computer Security Management” Metadata:
- Title: ➤ Advances in Computer Security Management
- Author: Marvin M. Wofsey
- Language: English
- Number of Pages: Median: 269
- Publisher: John Wiley & Sons - Wiley
- Publish Date: 1983
- Publish Location: Chichester
“Advances in Computer Security Management” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Security measures - Periodicals - Electronic data processing departments, security measures - Computer security
Edition Identifiers:
- The Open Library ID: OL21463667M - OL10306386M
- All ISBNs: 9780471262343 - 047126234X
Access and General Info:
- First Year Published: 1983
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Computer Security Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Computer security handbook
By Seymour Bosworth, Douglas B. Hoyt and Arthur E. Hutt

“Computer security handbook” Metadata:
- Title: Computer security handbook
- Authors: Seymour BosworthDouglas B. HoytArthur E. Hutt
- Language: English
- Number of Pages: Median: 1088
- Publisher: John Wiley & Sons - Wiley
- Publish Date: 1995
- Publish Location: New York
“Computer security handbook” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Security measures - Datensicherung - Computersicherheit - Computer security - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL7598638M - OL1118990M
- Online Computer Library Center (OCLC) ID: 31709608
- Library of Congress Control Number (LCCN): 94045254
- All ISBNs: 0471118540 - 9780471019077 - 0471019070 - 9780471118541
First Setence:
"The growth of computers and of information technology has been explosive."
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Cyber security standards, practices and industrial applications
By Junaid Ahmed Zubairi

“Cyber security standards, practices and industrial applications” Metadata:
- Title: ➤ Cyber security standards, practices and industrial applications
- Author: Junaid Ahmed Zubairi
- Language: English
- Publisher: Information Science Reference
- Publish Date: 2011
- Publish Location: Hershey, PA
“Cyber security standards, practices and industrial applications” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Computer networks - Security measures - Computer security - Data protection - Computer networks, security measures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL24823765M
- Library of Congress Control Number (LCCN): 2011009262
- All ISBNs: ➤ 1609608518 - 9781609608514 - 1609608526 - 9781609608538 - 1609608534 - 9781609608521
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber security standards, practices and industrial applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Computer Audit, Control and Security
By Robert R. Moeller

“Computer Audit, Control and Security” Metadata:
- Title: ➤ Computer Audit, Control and Security
- Author: Robert R. Moeller
- Language: English
- Number of Pages: Median: 611
- Publisher: John Wiley & Sons Inc - Wiley
- Publish Date: 1989 - 2008
- Publish Location: New York
“Computer Audit, Control and Security” Subjects and Themes:
- Subjects: Electronic data processing - Auditing - Computer security - Electronic data processing departments, security measures - Automation
Edition Identifiers:
- The Open Library ID: OL2213518M - OL9392992M
- Library of Congress Control Number (LCCN): 89036410
- All ISBNs: 9780471406761 - 0471853100 - 0471406767 - 9780471853107
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Audit, Control and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Infrastructure security
By Yair Frankel and Owen Rees

“Infrastructure security” Metadata:
- Title: Infrastructure security
- Authors: Yair FrankelOwen Rees
- Language: English
- Number of Pages: Median: 339
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2002 - 2003
“Infrastructure security” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Congresses - Security measures - Computer security - Data protection - Electronic data processing departments, security measures - Computer science - Computer networks - Operating systems (Computers) - Data encryption (Computer science) - Database management
Edition Identifiers:
- The Open Library ID: OL37111403M - OL9057972M
- Online Computer Library Center (OCLC) ID: 74456495 - 50554413
- Library of Congress Control Number (LCCN): 2002030664
- All ISBNs: 9783540458319 - 354045831X - 3540443096 - 9783540443094
First Setence:
"For many years, the use of biometrics to identify a person or verify one's identity was mainly used in government installations and Hollywood movies."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Infrastructure security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Computer Security in the Federal Government: How Do the Agencies Rate?
By United States
“Computer Security in the Federal Government: How Do the Agencies Rate?” Metadata:
- Title: ➤ Computer Security in the Federal Government: How Do the Agencies Rate?
- Author: United States
- Language: English
- Number of Pages: Median: 93
- Publisher: ➤ Government Printing Office - For sale by the Supt. of Docs., U.S. G.P.O. [Congressional Sales Office]
- Publish Date: 2002 - 2003
“Computer Security in the Federal Government: How Do the Agencies Rate?” Subjects and Themes:
- Subjects: ➤ Computer security - Administrative agencies - Data processing - Security measures - Executive departments - Electronic data processing departments - Electronic data processing departments, security measures - Executive departments, united states - United States
Edition Identifiers:
- The Open Library ID: OL10115813M - OL10115004M
- Online Computer Library Center (OCLC) ID: 53325612 - 51212476
- Library of Congress Control Number (LCCN): 2003387192 - 2003373577
- All ISBNs: 9780160691164 - 0160691168 - 0160707390 - 9780160707391
Author's Alternative Names:
"United States", "US Government", "Us Government", "USA", "America", "US", "U.S. Government", "United States." and "US GOVERNMENT"Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security in the Federal Government: How Do the Agencies Rate? at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Rullo Advances in Computer Security Management
By TA RULLO
“Rullo Advances in Computer Security Management” Metadata:
- Title: ➤ Rullo Advances in Computer Security Management
- Author: TA RULLO
- Language: English
- Number of Pages: Median: 210
- Publisher: John Wiley and Sons Ltd
- Publish Date: 1980
“Rullo Advances in Computer Security Management” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL10306224M
- All ISBNs: 9780471259992 - 0471259993
Access and General Info:
- First Year Published: 1980
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Rullo Advances in Computer Security Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.