Southville International School and Colleges
Your cart is empty.
  • Cart
  • Lists
    Public lists Eva Luna New books Lux_list list_1
    Your lists Log in to create your own lists
  • Log in to your account
  • Your cookies
  • Search history
Southville International School and Colleges
  • Advanced search
  • Recent comments
  • Most popular
  • Libraries

Log in to your account

Log in with GOOGLE


If you do not have an external account, but do have a local account, you can still log in:

  1. Home
  2. Advanced search
  3. Results of search for 'su:"INFORMATION SECURITY"', page 1 of 9

Refine your search

  • Availability

    • Limit to records with available items
  • Authors

    • Chen Xiaofeng
  • Holding libraries

    • College Library
  • Item types

    • Book Chapter
    • Curriculum - Based eBooks
    • Periodicals
  • Series

    • Journal of Computer ...
  • Topics

    • Awareness Motivation...
    • Compliance
    • Information Security...
    • INFORMATION SECURITY
    • Perspective

Your search returned 174 results.

Not what you expected? Check for suggestions
Sort
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next
  • Last
Unhighlight Highlight
Select all Clear all
Select titles to:
Public lists
list_1
New list
Results
1.
Image from Google Jackets
Information Security Practice And Experience: Javier Lopez and Yongdong Wu
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
2.
Image from Google Jackets
Information Security: The Complete Reference: Mark Rhodes-Ousley
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
3.
Image from Google Jackets
Information Security: The Complete Reference: Mark Rhodes-Ousley
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
4.
Image from Google Jackets
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Kyung-Hyune Rhee
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2014
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
5.
Image from Google Jackets
PRAGMATIC Security Metrics: Applying Metametrics to Information Security: Gary Hinson and W. Krag Brotby
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
6.
Image from Google Jackets
Cybersecurity Information Gathering using Kali Linux: Tim Scott
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
7.
Image from Google Jackets
Locked Down: Information Security for Lawyers: Sharon D. Nelson
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
8.
Image from Google Jackets
Cyber Threat: The Rise of Information Geopolitics in U.S. National Security: Chris Bronk
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
9.
Image from Google Jackets
Counterterrorism and Cybersecurity: Total Information Awareness: Newton Lee
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
10.
Image from Google Jackets
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide: James M. Stewart and Mike Chapple
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
11.
Image from Google Jackets
Modern Cryptography: Applied Mathematics for Encryption and Information Security: Chuck Easttom
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
12.
Image from Google Jackets
Information Security Auditor: Careers in information security:
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
13.
Image from Google Jackets
Don't Get Norteled: Authenticity works where information security technology has failed us: Wes Kussmaul
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
14.
Image from Google Jackets
Building a PCI DSS Information Security Program: Yves B. Desharnais
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
15.
Image from Google Jackets
Securing Systems: Applied Security Architecture and Threat Models: Brook S. E. Schoenfield
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
16.
Image from Google Jackets
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions: Thomas J. Mowbray
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
17.
Image from Google Jackets
31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam Patrick Gargano
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
18.
Image from Google Jackets
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 2nd Edition: Darril Gibson
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
19.
Image from Google Jackets
Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions Kiran Kumar Pabbathi
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2014
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
20.
Image from Google Jackets
Pattern and Security Requirements: Engineering-Based Establishment of Security Standards Kristian Beckers
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next
  • Last
Not finding what you're looking for?
  • Make a purchase suggestion

SOUTHVILLE LIBRARY

Southville International School and Colleges Library

1281 Tropical Ave. Cor. Luxembourg St., BF Homes International, Las Pinas City

Tel. No. 8256374 / 252358 Loc. 117/146

Powered by Koha