|
Real Threats, Real Dangers, Understanding Cyberthreats (Understanding Informatiuon Risk, Credibility and Danger Book 1)
by
really liked it 4.00 avg rating — 2 ratings
—
published
2012
|
|
|
The Payment Card Industry Data Security Standard V2.0 Compliance Policy (Writing Information Security Policies Book 26)
by
3.50 avg rating — 2 ratings
—
published
2011
|
|
|
ISO 17799 Compliant Unified Information Security Policy
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
The Network Security Policy (Writing Information Security Policies Book 47)
by
it was amazing 5.00 avg rating — 1 rating
—
published
2012
|
|
|
The Corporate Information Security Policy (Writing Information Security Policies Book 1)
by
1.67 avg rating — 3 ratings
—
published
2011
|
|
|
Untying the Gordian Knot, Demystifying Information Risk Assessment
by
really liked it 4.00 avg rating — 1 rating
—
published
2011
|
|
|
Information Risk Management Policy, Part A (Writing Information Security Policies Book 16)
by
really liked it 4.00 avg rating — 1 rating
—
published
2012
|
|
|
Rising Danger, Cybercrime 2012, Big Time Data Thefts
by
liked it 3.00 avg rating — 1 rating
—
published
2012
|
|
|
Writing Information Security Policies, Volume 4, The Roles and Responsibilities Policy
by
liked it 3.00 avg rating — 1 rating
—
published
2011
|
|
|
Understanding Access Controls, Logon with Identification & Authentication (Information Security in Brief, July 2012 Book 2)
by
liked it 3.00 avg rating — 1 rating
—
published
2012
|
|
|
Writing Information Security Policies: The Access Controil Policy
by
liked it 3.00 avg rating — 1 rating
—
published
2011
|
|
|
Information Risk Management in an Age of Enterprise
by
liked it 3.00 avg rating — 1 rating
—
published
2011
|
|
|
The Computer Security Policy (Writing Information Security Policies Book 3)
by
liked it 3.00 avg rating — 1 rating
—
published
2011
|
|
|
Application Vulnerability Management Security Policy (Writing Information Security Policies Book 49)
by
liked it 3.00 avg rating — 1 rating
—
published
2012
|
|
|
The Information Risk Self Assesment Part 1 of 4 (Untying the Gordian Knot, Demystifying Information Risk Assessment)
by
liked it 3.00 avg rating — 1 rating
—
published
2011
|
|
|
Being on Guard, Continuous Monitoring in an Age of Great and Growing Cyber-Danger (Advanced Protection Strategies Book 2)
by
did not like it 1.00 avg rating — 1 rating
—
published
2012
|
|
|
Vol. 10 The Secure Disposal Policy
by
0.00 avg rating — 0 ratings
—
published
2012
|
|
|
The Individual Accountability & Audit Policy (Writing Information Security Policies Book 5)
by
0.00 avg rating — 0 ratings
|
|
|
Malware and Mobile Code Management Policy, 2nd Edition (Writing Information Security Policies Book 48)
by
0.00 avg rating — 0 ratings
|
|
|
Survving 2012 & Beyond, Keeping Protection Policies Fit for Purpose
by
0.00 avg rating — 0 ratings
|
|
|
The Awareness and Training Policy (Writing Information Security Policies Book 24)
by
0.00 avg rating — 0 ratings
|
|
|
Off the Risk Radar? Residual Data and High Capacity Storage
by
0.00 avg rating — 0 ratings
|
|
|
Managing Attack Vectors to Disrupt Cyber-Attack Delivery (Advanced Protection Strategies Book 1)
by
0.00 avg rating — 0 ratings
|
|
|
The Data Backup Policy (Writing Information Security Policies Book 40)
by
0.00 avg rating — 0 ratings
|
|
|
Configuration Vulnerability Management Policy (Writing Information Security Policies Book 50)
by
0.00 avg rating — 0 ratings
|
|
|
Information Risk Management Policy, Part B (Writing Information Security Policies Book 16)
by
0.00 avg rating — 0 ratings
—
published
2012
|
|
|
August 2012 Understanding Individual Accountability & Audit (Information Security in Crief Book 3)
by
0.00 avg rating — 0 ratings
—
published
2012
|
|
|
Briefing 1, Principles of Asset Protection (Executive Briefings, Series 1, Asset Protection V2.0)
by
0.00 avg rating — 0 ratings
—
published
2012
|
|
|
Information Risk Trends & Recommendations, Summer 2012
by
0.00 avg rating — 0 ratings
—
published
2012
|
|
|
Part 3 of 4, Information Risk Self Assessment (Untying the Gordian Knot Demystifying Information Risk Assessment)
by
0.00 avg rating — 0 ratings
—
published
2012
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.