Information technology -- Security measures
Resource Information
The concept Information technology -- Security measures represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Information technology -- Security measures
Resource Information
The concept Information technology -- Security measures represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Information technology -- Security measures
55 Items that share the Concept Information technology -- Security measures
Context
Context of Information technology -- Security measuresSubject of
No resources found
No enriched resources found
- Whatever happened to privacy?
- Asset attack vectors : building effective vulnerability management strategies to protect organizations
- Asset protection through security awareness
- Auditing cloud computing : a security and privacy guide
- Build a security culture
- Can You hack it? : attack on personal information
- Collaboration with cloud computing : security, social media, and unified communications
- Computer security
- Computer worms and viruses
- CyberEthics
- Cybersecurity : managing systems, conducting testing, and investigating intrusions
- Data stewardship : an actionable guide to effective data management and data governance
- Developing cybersecurity programs and policies
- Emerging trends in ICT security
- Governance and internal controls for cutting edge IT
- How to cheat at managing information security
- How to use Web 2.0 and social networking sites securely
- IBM QRadar Version 7.3 : planning and installation guide
- ISO27001 / ISO27002 : a pocket guide / Alan Calder.
- IT disaster recovery planning for dummies
- In Google We Trust
- Information security : a practical guide : bridging the gap between IT and management
- Information security : principles and practices
- Information security for managers
- Information security governance simplified : from the boardroom to the keyboard
- Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
- Intelligent systems for security informatics
- Investigating the Cyber Breach : the digital forensics guide for the network engineer
- Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet
- Living in information : responsible design for digital places
- Once more unto the breach : managing information security in an uncertain world
- Penetration testing fundamentals
- Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
- Privacy and security
- Responsive security : be ready to be secure
- Risk management framework : a lab-based approach to securing information systems
- Safeguarding your privacy at home and work
- Security : the human factor
- Security Start-Up : Selling Safety
- Security de-engineering : solving the problems in information risk management
- Security without obscurity : a guide to confidentiality, authentication, and integrity
- Social engineering in IT security : tools, tactics, and techniques
- Spam
- Strategic security management : a risk assessment guide for decision makers
- Ten rules of information security for the smaller business : a plain English guide
- The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
- The Real big brother
- The art of enterprise information architecture : a systems-based approach for unlocking business insight
- The basics of information security : understanding the fundamentals of InfoSec in theory and practice
- The cloud security ecosystem : technical, legal, business and management issues
- The new school of information security
- The new school of information security
- The true cost of information security breaches and cyber crime
- Threat 2.0 : security and compliance for Web 2.0 sites
- Total information risk management : maximizing the value of data and information assets
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/iK2mZnx6Lss/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/iK2mZnx6Lss/">Information technology -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Information technology -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/iK2mZnx6Lss/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/iK2mZnx6Lss/">Information technology -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>