Erweiterte Suche
Preis einschränken:

Newsletter

Melden Sie sich jetzt an und erhalten Sie regelmäßig Informationen über neue Produkte, Sonderangebote oder neue Gutscheine.

Mit * gekennzeichnete Felder sind Pflichtfelder.

223,63 EUR*
Details Information Security in Research and Business: Proceedings Of The Ifip Tc11 13Th International Conference On Information Security (Sec '97): 14-16 May ... in Information and Communication Technology)

Information Security in Research and Business Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97): 14-16 May 1997, Copenhagen, Denmark

145,63 EUR*
Details Management of Information Security

Management of Information Security Suitable for Information Security professionals, managers of IT employees, business managers, organizational security officers, network administrators, students or Business and Information Systems, IT, Accounting ...

50,35 EUR*
Details Information Security Risk Management Handbook

Information Security Risk Management Handbook International standard ISO/IEC 27001 is a world recognized standard for establishing, implementing, monitoring and reviewing, updating and improving an ISMS. This book focuses on the concept of having an ...

88,59 EUR*
Details Implementing Information Security in Healthcare: Building a Security Program (Himss Book)

Seiten: 294, Taschenbuch, Healthcare Information & Management Systems Society

139,05 EUR*
Details Security Education and Critical Infrastructures (IFIP Advances in Information and Communication Technology)

Security Education and Critical Infrastructures Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: -Curriculum design ...

17,00 EUR*
Details #Information Technology Security Manager Hashtag Canvas Wall Art  12 x 8 Zoll

#Information Technology Security Manager Hashtag Leinwände sind dekorative Bilder gemacht von einem Sinthetic Leinen die digital gedruckt werden. Dekorieren Sie Ihr Zuhause in eine neue und originelle Art und Weise. Eine breite Palette von Farben ...

17,00 EUR*
Details Got Information Technology Security Manager? Canvas Wall Art  12 x 8 Zoll

Got Information Technology Security Manager? Leinwände sind dekorative Bilder gemacht von einem Sinthetic Leinen die digital gedruckt werden. Dekorieren Sie Ihr Zuhause in eine neue und originelle Art und Weise. Eine breite Palette von Farben ...

245,03 EUR*
Details Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

Quality Of Protection Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality ...

90,16 EUR*
Details Information Security Architecture: An Integrated Approach to Security in the Organization

Seiten: 393, Ausgabe: 2nd ed., Gebundene Ausgabe, Auerbach Publishers Inc.

149,79 EUR*
Details Security in E-Learning (Advances in Information Security)

Seiten: 204, Ausgabe: Softcover reprint of hardcover 1st ed. 2005, Taschenbuch, Springer US

139,09 EUR*
Details Security for Telecommunications Networks (Advances in Information Security)

Seiten: 192, Ausgabe: Softcover reprint of hardcover 1st ed. 2008, Taschenbuch, Springer

149,79 EUR*
Details Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)

This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information ...

68,33 EUR*
Details Assessing Information Security: Strategies, Tactics, Logic and Framework

Assessing Information Security Cybercrime is on the move. Cybercrime and related forms of malicious activity will seek out your weak points in order to exploit them for their own advantage. This book is about the philosophy, strategy and tactics of ...

56,23 EUR*
Details Hands-On Information Security Lab Manual

*Lab Principle Info Secur The Hands-On Information Security Lab Manual, Second Edition allows students to apply the basics of their introductory security knowledge in a hands-on environment with detailed exercises using Windows 2000, XP and Linux ...

101,64 EUR*
Details Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Lecture Notes in Computer Science)

Information Security and Privacy Constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. This book presents papers that are organized in topical ...

74,90 EUR*
Details Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Lecture Notes in Computer Science)

Information and Communications Security Constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012.

13,00 EUR*
Details I love Information Technology Security Manager Horizontal sign

Die I love Information Technology Security Manager Kunststoffschild ist eine tolle Möglichkeit Ihre Zone, zu markieren. Überraschen Sie Ihre Familie und Freunde mit unserer ursprünglichen Acrylschilder . Sie kommen mit abgerundeten Ecken und einem ...

30,55 EUR*
Details Conquest in Cyberspace: National Security and Information Warfare

Conquest in Cyberspace This book shows the risks and protections cyberspace offers for national security and information warfare. Full description

75,37 EUR*
Details Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings (Lecture Notes in Computer Science)

Information Security Taken from the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997, this volume includes presentation of topics on public-key cryptosystems, cryptoanalysis ...

80,99 EUR*
Details Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is ...

87,23 EUR*
Details Managing Risk in Information Systems (Information Systems Security & Assurance Series)

Managing Risk In Information Systems PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks ...

101,64 EUR*
Details ISSE 2011 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2011 Conference

This book presents the most interesting talks given at ISSE 2011 -- the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Computing & Enterprise Security Services ...

47,13 EUR*
Details Security Governance Checklists: Business Operations, Security Governance, Risk Management, and Enterprise Security Architecture (Large Print)

Security Governance Checklists The Chief Information Security Officer's (CISO) Toolkit is a collection of books and software for the Chief Information Security Officer (CISO) of a substantial enterprise. Security Checklists provides lists of items ...

50,24 EUR*
Details Effective Physical Security

Effective Physical Security Delivers a wealth of practical information on the process of securing a facility. This title includes chapters on: ISO Standards for Risk Assessment & Risk Management; Information Security for Practitioners; Crime ...

13,00 EUR*
Details Only for the best Information Technology Security Manager Parking Sign

Die Private Parking Only for the best Information Technology Security Manager All other will be towed Parkschild ist eine tolle Möglichkeit Ihre Zone, zu markieren, als ob es eine echte Straße waren. Überraschen Sie Ihre Familie und Freunde mit ...

49,00 EUR*
Details A Six Sigma Approach to Assure IT Security: Secure the Digital World

A Six Sigma Approach to Assure IT Security Today information is considered as an asset just like capital either it is related to a personal or corporate. Global sharing and information losses enforce organizations to think about their information ...