1. SECURITY AND PRIVACY CONTROLS IN RFID SYSTEMS

    SECURITY AND PRIVACY CONTROLS IN RFID SYSTEMS

    4,271

    博客來

  2. MOBILE DEVICE SECURITY: THREATS AND CONTROLS

    MOBILE DEVICE SECURITY: THREATS AND CONTROLS

    1,976

    博客來

  3. INFORMATION SECURITY: A GUIDE FOR IMPLEMENTING SECURITY CONTROLS ON INFORMATION ASSETS

    INFORMATION SECURITY: A GUIDE FOR IMPLEMENTING SECURITY CONTROLS ON INFORMATION ASSETS

    2,749

    博客來

  4. RELATION BETWEEN CYBER INSURANCE AND SECURITY INVESTMENTS/CONTROLS

    RELATION BETWEEN CYBER INSURANCE AND SECURITY INVESTMENTS/CONTROLS

    1,520

    博客來

  5. SECURITY CONTROLS EVALUATION, TESTING, AND ASSESSMENT HANDBOOK

    SECURITY CONTROLS EVALUATION, TESTING, AND ASSESSMENT HANDBOOK

    4,497

    博客來

  6. SECURITY MANAGEMENT CONTROLS A COMPLETE GUIDE - 2020 EDITION

    SECURITY MANAGEMENT CONTROLS A COMPLETE GUIDE - 2020 EDITION

    5,667

    博客來

  7. SILENCING SCIENCE: NATIONAL SECURITY CONTROLS AND SCIENTIFIC COMMUNICATION

    SILENCING SCIENCE: NATIONAL SECURITY CONTROLS AND SCIENTIFIC COMMUNICATION

    4,200

    博客來

  8. SECURITY CONTROLS EVALUATION, TESTING, AND ASSESSMENT HANDBOOK

    SECURITY CONTROLS EVALUATION, TESTING, AND ASSESSMENT HANDBOOK

    5,997

    博客來

  9. SILENCING SCIENCE: NATIONAL SECURITY CONTROLS & SCIENTIFIC COMMUNICATION

    SILENCING SCIENCE: NATIONAL SECURITY CONTROLS & SCIENTIFIC COMMUNICATION

    3,300

    博客來

  10. INFORMATION SECURITY CONTROLS A COMPLETE GUIDE - 2020 EDITION

    INFORMATION SECURITY CONTROLS A COMPLETE GUIDE - 2020 EDITION

    5,667

    博客來

  11. PHYSICAL SECURITY CONTROLS A COMPLETE GUIDE - 2020 EDITION

    PHYSICAL SECURITY CONTROLS A COMPLETE GUIDE - 2020 EDITION

    5,667

    博客來

  12. ARMED FORCES AND SECURITY SERVICES: WHAT DEMOCRATIC CONTROLS?

    ARMED FORCES AND SECURITY SERVICES: WHAT DEMOCRATIC CONTROLS?

    4,200

    博客來

  13. INFORMATION SECURITY MANAGEMENT CONTROLS A COMPLETE GUIDE - 2020 EDITION

    INFORMATION SECURITY MANAGEMENT CONTROLS A COMPLETE GUIDE - 2020 EDITION

    5,667

    博客來

  14. RISKS, CONTROLS, AND SECURITY: CONCEPTS AND APPLICATIONS

    RISKS, CONTROLS, AND SECURITY: CONCEPTS AND APPLICATIONS

    4,372

    博客來

  15. APPLIED CYBER SECURITY AND THE SMART GRID: IMPLEMENTING SECURITY CONTROLS INTO THE MODERN POWER INFRASTRUCTURE

    APPLIED CYBER SECURITY AND THE SMART GRID: IMPLEMENTING SECURITY CONTROLS INTO THE MODERN POWER INFRASTRUCTURE

    3,597

    博客來

  16. AZURE SECURITY FOR CRITICAL WORKLOADS: IMPLEMENTING MODERN SECURITY CONTROLS FOR AUTHENTICATION, AUTHORIZATION AND AUDITING

    AZURE SECURITY FOR CRITICAL WORKLOADS: IMPLEMENTING MODERN SECURITY CONTROLS FOR AUTHENTICATION, AUTHORIZATION AND AUDITING

    1,710

    博客來

  17. EXPORTS CONTROLS: ARE WE PROTECTING SECURITY AND FACILITATING EXPORTS?

    EXPORTS CONTROLS: ARE WE PROTECTING SECURITY AND FACILITATING EXPORTS?

    989

    博客來

  18. EXPORT CONTROLS: BALANCING U.S. COMPETITIVENESS WITH SECURITY

    EXPORT CONTROLS: BALANCING U.S. COMPETITIVENESS WITH SECURITY

    3,610

    博客來

  19. IT SECURITY CONTROLS: A GUIDE TO CORPORATE STANDARDS AND FRAMEWORKS

    IT SECURITY CONTROLS: A GUIDE TO CORPORATE STANDARDS AND FRAMEWORKS

    2,660

    博客來

  20. AUDITING INFORMATION AND CYBER SECURITY GOVERNANCE: A CONTROLS-BASED APPROACH

    AUDITING INFORMATION AND CYBER SECURITY GOVERNANCE: A CONTROLS-BASED APPROACH

    3,574

    博客來