Books on the topic 'Electronic data processing – Security systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Electronic data processing – Security systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Managing Risk in Information Systems. Jones & Bartlett Publishers, Incorporated, 2010.
Find full textBowman, Ronald H. Business continuity planning for data centers and systems: A strategic implementation guide. John Wiley & Sons, 2008.
Find full textSteinauer, Dennis. Security of personal computer systems: A management guide. U.S. Dept. of Commerce, National Bureau of Standards, 1985.
Find full textPeltier, Thomas R. Policies & procedures for data security: A complete manual for computer systems and networks. Miller Freeman Inc., 1991.
Find full textDavies, Donald Watts. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Wiley, 1989.
Find full textCheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2001.
Find full textCheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2004.
Find full textCheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2003.
Find full textZubairi, Junaid Ahmed. Cyber security standards, practices and industrial applications: Systems and methodologies. Information Science Reference, 2011.
Find full textRaggad, Bel G. Information security management: Concepts and practice. Taylor & Francis, 2010.
Find full textNational Computer Security Center (U.S.), ed. A guide to understanding configuration management in trusted systems. National Computer Security Center, 1989.
Find full textTittel, Ed. CISSP: Certified Information Systems Security Professional study guide. SYBEX, 2003.
Find full textPolice, Royal Canadian Mounted. Technical security standard for information technology. Treasury Board, 1995.
Find full textSecurity engineering: A guide to building dependable distributed systems. Wiley, 2001.
Find full textAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Wiley Technology Pub., 2008.
Find full textAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Wiley Technology Pub., 2008.
Find full textSecurity engineering: A guide to building dependable distributed systems. 2nd ed. Wiley Technology Pub., 2008.
Find full textXiao, Yang. Security in distributed and networking systems. World Scientific, 2007.
Find full textGuard, United States Coast. Automated information systems (AIS) security manual. U.S. Dept. of Transportation, U.S. Coast Guard, 1987.
Find full textSociety, Canadian Information Processing. The protection of privacy in information systems: Operational guidelines. The Society, 1988.
Find full textStallings, William. Business data communications: Infrastructure, networking and security. 8th ed. Pearson, 2013.
Find full textUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. Internal Revenue Service, 1990.
Find full textUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. Internal Revenue Service, 1990.
Find full textUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. Internal Revenue Service, 1990.
Find full textSair Linux and GNU certification level I: Security, ethics, and privacy. Wiley, 2001.
Find full textJordan, Carole S. A Guide to understanding discretionary access control in trusted systems. National Computer Security Center, 1987.
Find full textGuard, United States Coast. Automated information systems (AIS) security manual. U.S. Dept. of Transportation, U.S. Coast Guard, 1987.
Find full textIFIP TCII International Conference onComputer Security (4th 1986 Monte Carlo, Monaco). Security and protection in information systems: Proceedings of the fourth IFIP TCII International Conference on Computer Security, IFIP/Sec'86 Monte Carlo, Monaco, 2-4 December, 1986. North-Holland, 1989.
Find full textIFIP International Conference on Computer Security (4th 1986 Monte-Carlo, Monaco). Security and protection in information systems: Proceedings of the Fourth IFIP TC 11 International Conference on Computer Security, IFIP/SEC '86, Monte Carlo, Monaco, 2-4 December, 1986. North-Holland, 1989.
Find full textHook, Chris. Data protection implications for systems design. NCC Publications, 1989.
Find full textService, United States Internal Revenue. You are the key!: An employee guide to Automated Information Systems Security. Dept. of the Treasury, Internal Revenue Service, 1990.
Find full textUnited States. Internal Revenue Service. You are the key!: An employee guide to Automated Information Systems Security. Dept. of the Treasury, Internal Revenue Service, 1990.
Find full textUnited States. Internal Revenue Service. You are the key!: An employee guide to Automated Information Systems Security. Dept. of the Treasury, Internal Revenue Service, 1990.
Find full textPrivacy, and Security Research Group Workshop on Network and Distributed System Security (1993 San Diego Calif ). Privacy and Security Research Group Workshop on Network and Distributed System Security: Proceedings, February 11-12, 1993, Catamaran Hotel, San Diego, California. s.n.], 1993.
Find full textMontana. Legislature. Legislative Audit Division. Montana Lottery security, Department of Administration: Information system audit. The Division, 2003.
Find full textMontana. Legislature. Legislative Audit Division. Montana Lottery security, Department of Commerce: Information system audit. The Division, 1999.
Find full texteditor, Malik Javvad, ed. Official (ISC)2® guide to the CISSP® CBK®: Certified Information Systems Security Professional. CRC Press, 2015.
Find full textToshimitsu, Masuzawa, and Tixeuil Sébastien, eds. Stabilization, safety, and security of distributed systems: 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings. Springer, 2007.
Find full text1975-, Chapple Mike, and Tittel Ed, eds. CISSP: Certified Information Systems Security Professional. 5th ed. Wiley Pub., 2011.
Find full textStewart, James Michael. CISSP: Certified Information Systems Security Professional. 4th ed. John Wiley & Sons, Ltd., 2008.
Find full textMichael, Stewart James, and Chapple Mike, eds. CISSP: Certified Information Systems Security Professional. 2nd ed. SYBEX, 2004.
Find full textChakrabarti, Anirban, Abhijit Belapurkar, Harigopal Ponnapalli, Niranjan Varadarajan, and Srinivas Padmanabhuni. Distributed Systems Security: Issues, Processes and Solutions. Wiley & Sons, Incorporated, John, 2009.
Find full textSSCP Systems Security Certified Practitioner. Wiley & Sons, Incorporated, John, 2015.
Find full text1948-, Muftic Sead, ed. Security architecture for open distributed systems. Wiley, 1993.
Find full text