1. Introduction to security. (2018) Authors: Fischer, Robert J; Halibozek, Edward P; Walters, David, 1963- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Technology security and national power : winners and losers /: winners and losers. ([2016]) Authors: Bryen, Stephen D (Stephen David) Record Type: Book Extent: 1 online resource (xii, 315 pages ), maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Effective security management. ([2016]) Authors: Sennewald, Charles A; Baillie, Curtis Record Type: Book Extent: 1 online resource (xxiii, 378 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Enterprise level security 2 : advanced topics in an uncertain world /: advanced topics in an uncertain world. (2020) Authors: Foltz, Kevin E; Simpson, William Randolph, 1946- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Professional security management : a strategic guide /: a strategic guide. (2020) Authors: Swanson, Charles R, 1942- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. IEIS2019 : proceedings of the 6th International Conference on Industrial Economics System and Industrial Security Engineering /: proceedings of the 6th International Conference on Industrial Economics System and Industrial Security Engineering. (2020) Other Names: Li, Menggang; Dresner, Martin; Zhang, Runtong; Hua, Guowei; Shang, Xiaopu; International Conference on Industrial Economics System and Industrial Security Engineering, 6th Record Type: Book Extent: 1 online resource (743 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Pentesting industrial control systems : an ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes /: an ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes. (2021) Authors: Smith, Paul Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Corporate investigations, corporate justice and public-private relations : towards a new conceptualisation /: towards a new conceptualisation. ([2019]) Authors: Meerts, Clarissa A Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Sicherheitsfibel. ([2018]) Authors: Merschbacher, Adam Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /: develop a threat model and incident response strategy to build a strong information security framework. (2017) Authors: Death, Darren Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗