1. Building a comprehensive IT security program : practical guidelines and best practices /: practical guidelines and best practices. (2016) Authors: Wittkop, Jeremy Record Type: Book Extent: 1 online resource (xix, 195 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cybersecurity incident response : how to contain, eradicate, and recover from incidents /: how to contain, eradicate, and recover from incidents. (2018) Authors: Thompson, Eric C Record Type: Book Extent: 1 online resource (xv, 176 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Practical information security management : a complete guide to planning and implementation /: a complete guide to planning and implementation. (2016) Other Names: Campbell, Tony Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Critical infrastructure protection research : results of the first critical infrastructure protection research project in Hungary /: results of the first critical infrastructure protection research project in Hungary. ([2016]) Editors: Nádai, László; Padányi, József, 1959- Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Privileged attack vectors : building effective cyber-defense strategies to protect organizations /: building effective cyber-defense strategies to protect organizations. (2018) Authors: Haber, Morey J; Hibbert, Brad Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Trust, privacy and security in digital business : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings /: 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings. (2015) Editors: Fischer-Hübner, Simone; Lambrinoudakis, Costas; López, Javier Other Names: TrustBus (Conference), 12th Record Type: Book Extent: 1 online resource (xii, 235 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Information security management handbook. Vol. 4 (2010) Other Names: Tipton, Harold F; Nozaki, Micki Krause Record Type: Book Extent: 1 online resource (xii, 517 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Trust, privacy and security in digital business : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings /: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. (2017) Editors: López, Javier; Fischer-Hübner, Simone; Lambrinoudakis, Costas Other Names: TrustBus (Conference), 14th Record Type: Book Extent: 1 online resource (x, 247 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Trust, privacy, and security in digital business : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016. Proceedings /: 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016. Proceedings. (2016) Editors: Katsikas, Sokratis K; Lambrinoudakis, Costas; Furnell, Steven, 1970- Other Names: TrustBus (Conference), 13th Record Type: Book Extent: 1 online resource (ix, 123 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Managing an Information Security and Privacy Awareness and Training Program. (2010) Other Names: Herold, Rebecca Record Type: Book Extent: 1 online resource (545 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗