ListsEmbu Security Management and Police Studies

Download list Send list Print list
| Select titles to:
Building an information security awareness program by Gardner, Bill Publication: Waltham, Massachusetts : Syngress, . 1 online resource (215 pages) Holdings: Actions: Add to cart
Corporate security organizational structure, cost of services and staffing benchmark by Hayes, Bob E., Publication: Burlington : Elsevier Science, . 1 online resource. Holdings: Actions: Add to cart
Cyber attacks by Amoroso, Edward G. Publication: Burlington, MA : Butterworth-Heinemann, . 1 online resource. , Includes index. Holdings: Actions: Add to cart
Data Warehousing and Data Mining Techniques for Cyber Security by Singhal, Anoop. Publication: Boston, MA : Springer US, Holdings: Actions: Add to cart
Digital video surveillance and security by Caputo, Anthony C. Publication: Burlington, MA : Butterworth-Heinemann/Elsevier, . 1 online resource (xvii, 333 p.) : , Includes index. Holdings: Actions: Add to cart
Embedded systems security by Kleidermacher, David. Publication: Amsterdam : Elsevier, . 1 online resource (xx, 396 pages) : Holdings: Actions: Add to cart
Environmental Security and Environmental Management: The Role of Risk Assessment by Morel, Benoit. Publication: Dordrecht : Springer Netherlands, Holdings: Actions: Add to cart
Information governance and security : by Iannarelli, John, Publication: . 1 online resource (xvi, 191 pages) : Holdings: Actions: Add to cart
Information Security Governance by Solms, S.H. Publication: Boston, MA : Springer US, Holdings: Actions: Add to cart
Integrated Water Resources Management and Security in the Middle East by Lipchin, Clive. Publication: Dordrecht : Springer Netherlands, Holdings: Actions: Add to cart
Managing Information Risk and the Economics of Security by Johnson, M. Eric. Publication: Boston, MA : Springer US, Holdings: Actions: Add to cart
Managing information security   Publication: Amsterdam ; | Waltham, MA : Syngress, . 1 online resource Holdings: Actions: Add to cart
Managing Information Systems Security and Privacy by Trček, Denis. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, Holdings: Actions: Add to cart
Managing online risk : by Gonzalez, Deborah. Publication: . 1 online resource , Machine generated contents note: Chapter 1: Risk Management, Data Style Chapter 2: Internal and External Risks Chapter 3: Reputation and Identity Chapter 4: The New Workforce Chapter 5: The Data Door Chapter 6: Approaches to Content Chapter 7: Compliance Chapter 8: Currency and Campaigns Chapter 9: Digital Succession Chapter 10: The Online Story Continues. Holdings: Actions: Add to cart
Metrics and methods for security risk management by Young, Carl S. Publication: Amsterdam ; | Boston : Syngress/Elsevier, . 1 online resource (xx, 272 p.) : Holdings: Actions: Add to cart
Network and system security   Publication: Amsterdam ; | Boston : Syngress, . 1 online resource , Includes index. Holdings: Actions: Add to cart
Nine practices of the successful security leader by Hayes, Bob E., Publication: Oxford ; | Waltham, Mass. : Elsevier, . 1 online resource Holdings: Actions: Add to cart
Performance evaluation and attribution of security portfolios by Fischer, Bernd R. Publication: Oxford : Academic Press, . 1 online resource. Holdings: Actions: Add to cart
Personnel protection : by Miller, Jerome, Publication: . 1 online resource. Holdings: Actions: Add to cart
Personnel protection : by Miller, Jerome, Publication: . 1 online resource (10 pages). Holdings: Actions: Add to cart No cover image available
 <<  <  1  2  3    >>

Kenyatta University ...ISO 9001:2008 Certified
Copyright © 2014 Kenyatta University. All Rights Reserved.