Tomeki

Explore Books on
protection de l'information (informatique)

1-24 of 166 Books

View No Place to Hide By Glenn Greenwald
Cover of No Place to Hide by glenn greenwald

No Place to Hide

By Glenn Greenwald

View Security without Obscurity By Jeff Stapleton
Cover of Security without Obscurity by jeff stapleton

Security without Obscurity

By Jeff Stapleton

View Data Protection By Preston de Guise

Data Protection

Data Protection

By Preston de Guise

View Cloud Computing Security By John R. Vacca
Cover of Cloud Computing Security by john r. vacca

Cloud Computing Security

By John R. Vacca

View Information security fundamentals By Thomas R. Peltier
Cover of Information security fundamentals by thomas r. peltier

Information security fundamentals

By Thomas R. Peltier

View Information security policies and procedures By Thomas R. Peltier
Cover of Information security policies and procedures by thomas r. peltier

Information security policies and procedures

By Thomas R. Peltier

View Responsive Security By Meng Chow Kang

Responsive Security

Responsive Security

By Meng Chow Kang

View Building a global information assurance program By Raymond J. Curts
Cover of Building a global information assurance program by raymond j. curts

Building a global information assurance program

By Raymond J. Curts

View Information assurance architecture By Keith D. Willett
Cover of Information assurance architecture by keith d. willett

Information assurance architecture

By Keith D. Willett

View Why CISOs Fail By Barak Engel

Why CISOs Fail

Why CISOs Fail

By Barak Engel

View Policy Change in the Area of Freedom, Security and Justice By Florian Trauner,Ariadna Servent

Policy Change in the Area of Freedom, Security and Justice

Policy Change in the Area of Freedom, Security and Justice

By Florian Trauner,Ariadna Servent

View A Practical Guide to Security Assessments By Sudhanshu Kairab
Cover of A Practical Guide to Security Assessments by sudhanshu kairab

A Practical Guide to Security Assessments

By Sudhanshu Kairab

View Investigator's Guide to Steganography By Gregory Kipper
Cover of Investigator's Guide to Steganography by gregory kipper

Investigator's Guide to Steganography

By Gregory Kipper

View The security risk assessment handbook By Douglas J. Landoll
Cover of The security risk assessment handbook by douglas j. landoll

The security risk assessment handbook

By Douglas J. Landoll

View Data protection for library and information services By Paul Ticher

Data protection for library and information services

Data protection for library and information services

By Paul Ticher

View Cybersecurity for Everyone By David B. Skillicorn

Cybersecurity for Everyone

Cybersecurity for Everyone

By David B. Skillicorn

View Security without obscurity By Jeffrey James Stapleton

Security without obscurity

Security without obscurity

By Jeffrey James Stapleton

View Privacy and Identity in a Networked Society By Stefan Strauß

Privacy and Identity in a Networked Society

Privacy and Identity in a Networked Society

By Stefan Strauß

View Access and Control in Digital Humanities By Shane Hawkins

Access and Control in Digital Humanities

Access and Control in Digital Humanities

By Shane Hawkins

View Data Protection Officer By Paul Lambert

Data Protection Officer

Data Protection Officer

By Paul Lambert

View Human Dimensions of Cybersecurity By Terry Bossomaier,Roger Bradbury,Steven D'Alessandro

Human Dimensions of Cybersecurity

Human Dimensions of Cybersecurity

By Terry Bossomaier,Roger Bradbury,Steven D'Alessandro

View Managing Cyber Risk in the Financial Sector By Ruth Taplin

Managing Cyber Risk in the Financial Sector

Managing Cyber Risk in the Financial Sector

By Ruth Taplin

View Information security policies, procedures, and standards By Douglas J. Landoll

Information security policies, procedures, and standards

Information security policies, procedures, and standards

By Douglas J. Landoll

View Information security policies, procedures, and standards By Thomas R. Peltier
Cover of Information security policies, procedures, and standards by thomas r. peltier

Information security policies, procedures, and standards

By Thomas R. Peltier