Information security management handbook / Micki Krause, Harold F. Tipton, editors.
Publication details: Boca Raton, FL : Auerbach, c2000.Edition: 4th edDescription: v. <1-4 > : ill. ; 24 cmISBN:- 0849398290
- 658/.0558 21
- QA76.9.A25 H36 2000Ref
Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|
Technology (N) Library | QA76.9.A25 H36 2000Ref (Browse shelf(Opens below)) | Available | 1782449 |
Browsing Technology (N) Library shelves Close shelf browser (Hides shelf browser)
No cover image available No cover image available No cover image available | No cover image available No cover image available No cover image available | |||||||
QA76.87.I35 Per. IEEE Transactions on natural networks / | QA76.87.I35 Per. IEEE Transactions on natural networks / | QA76.87 .M53 Qualitative analysis and synthesis of recurrent neural networks / | QA76.9.A25 H36 2000Ref Information security management handbook / | QA76.9.A25 S35 1996 Applied cryptography : protocols, algorithms, and source code in C / | QA76.9.A25 S35 1996 Applied cryptography : protocols, algorithms, and source code in C / | QA76.9.A25 S35 1996 Applied cryptography : protocols, algorithms, and source code in C / |
Rev. ed. of: Handbook of information security management 1999.
Vol. 1 lacks numbering.
Includes bibliographical references.
There are no comments on this title.