1. Using the common criteria for IT security evaluation. (©2003) Other Names: Herrmann, Debra S Record Type: Book Extent: 1 online resource (xvi, 288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cloud computing security : foundations and challenges /: foundations and challenges. (2017) Editors: Vacca, John R, 1947- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Security in the private cloud. ([2017]) Editors: Vacca, John R Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Data protection in the financial services industry. (2017) Other Names: Webster, Mandy Record Type: Book Extent: 1 online resource (242 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Information security : policy, processes, and practices /: policy, processes, and practices. (2016) Other Names: Straub, Detmar W; Goodman, Seymour E; Baskerville, Richard Record Type: Book Extent: 1 online resource (288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Business continuity management system : a complete framework for implementing ISO 22301 /: a complete framework for implementing ISO 22301. (2015) Other Names: Wong, Wei Ning Zechariah; Shi, Jianping Record Type: Book Extent: 1 online resource (xvi, 279 pages .) View Content: Available online (eLD content is only available in our Reading Rooms) ↗