Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
by Gordon Corera
Narrated by  Gildart Jackson
Audiobook (Unabridged)

$22.95

. Price is $22.95 . You save %.
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings, Author: Josef Pieprzyk
Title: Vulnerability Management, Author: Park Foreman
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, Author: Ton Kalker
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez

Pagination Links