Refine your search

Your search returned 41 results.

Sort
Results
1.
The executive MBA in information security / John J. Trinckes, Jr. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2010
Availability: Items available for loan: Indore (1)Call number: 005.8 T7E9.

2.
Security and control in information systems: a guide for business and accounting / Andrew Hawker by
Material type: Text Text; Literary form: Not fiction
Publication details: London : Routledge, 2000
Availability: Items available for loan: Indore (1)Call number: 005.8 S3H2.

3.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Sterling, VA : Kogan Page, c2006
Availability: Items available for loan: Indore (1)Call number: 005.8 C2B8.

4.
Information security and ethics Vol 3 by Series:
Edition:
Material type: Text Text
Publication details: Hershey Information Science Reference 2008
Availability: Not available: Kozhikode: Withdrawn (1).

5.
Information security governance by Series: Wiley series in systems engineering and management
Edition:
Material type: Text Text
Publication details: USA John wiley 2009
Availability: Items available for loan: Kozhikode (1)Call number: 65.012.45.004.4 BRO.

6.
IT risk by Series:
Edition:
Material type: Text Text
Publication details: Boston Harvard business school press 2007
Availability: Items available for loan: Kozhikode (1)Call number: 65.012.45 WES.

7.
CISO soft skills by Series:
Edition:
Material type: Text Text
Publication details: Boca Raton CRC Press 2009
Availability: Items available for loan: Kozhikode (1)Call number: 681.3.004.4 COL/C.

8.
Auditing cloud computing by Series:
Edition:
Material type: Text Text
Publication details: New Jersey John Wiley and Sons 2011
Availability: Items available for loan: Kozhikode (1)Call number: 681.324:658 HAL/A.

9.
IT risk: turning business threats into competitive advantage Westerman, George by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston HBS Press 2007
Availability: Items available for loan: Ahmedabad (1)Call number: 658.4 W3I8.

10.
Advances in enterprise information technology security Khadraoui, Djamel by
Publication details: New York Information Science Reference 2007
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 K4A2. Shillong (2).

11.
Security de-engineering : solving the problems in information risk management Tibble, Ian. by
Publication details: Boca Raton CRC Press 2011
Availability: Items available for reference: Ahmedabad: Not For Loan (1)Call number: 658.478 T4S3.

12.
IT security metrics: a practical framework for measuring security and protecting data Hayden, Lance by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata McGraw Hill Education Private Limited 2010
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 H2I8.

13.
Security strategy: from requirements to reality Stackpole, Bill by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton CRC Press 2011
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 S8S3.

14.
The art of enterprise information architecture: a systems-based approach for unlocking business insight Godinez, Mario by
Publication details: Noida Dorling Kindersley India Pvt. Ltd., 2010
Availability: Items available for loan: Ahmedabad (1)Call number: 658.4038011 G6A7.

15.
Information security intelligence cryptographic principles and applications by
Publication details: Australia Thomson 2007
Availability: Items available for loan: Lucknow (1).

16.
Information security a manager's guide to thwarting data thieves and hackers by
Publication details: New Delhi Pentagon Press 2008
Availability: Items available for loan: Lucknow (1).

17.
Auditing cloud computing a security and privacy guide by
Publication details: New Jersey John Wiley 2011
Availability: Items available for loan: Lucknow (1).

18.
IT risk turning business theats into competitive advantage George Westerman, Richard Hunter by
Publication details: Boston HBS 2007
Availability: Items available for loan: Lucknow (1).

19.
20.
IT Risk Turning business threats into competitive advantage by
Publication details: Boston Harvard Business School Press 2007
Availability: Items available for loan: Kashipur (1).

Pages

Powered by Koha