19 results on '"Computer security--Management"'
Search Results
2. Acting for you, April 2024
3. CEO memo October - Cyber security standards and awareness to help mitigate risks for your organisation
4. When held to ransom: Legal implications of ransomware attacks for legal practitioners and their clients
5. Managing third-party risk
6. Electronically tracking and neutralising a naval adversary
7. Bridging data privacy and cybersecurity (no they're not the same thing)
8. Cybersecurity risk management - safeguarding your licence to operate
9. SecTech roadshow shows what security has to offer
10. Managing cybersecurity governance
11. Strategic sagacity for security and privacy of personal data
12. Q and A: Mike Johnstone - 'The scammers use all sorts of tricks to take advantage of the good nature of people.'
13. Q and A: Mike Johnstone - 'The scammers use all sorts of tricks to take advantage of the good nature of people.'
14. The rise of IoT devices in schools: Ensuring secure, connected learning for Australian students
15. The cybernetic sea: Australia's approach to the wave of cybercrime
16. An Ontology-driven Approach Applied to Information Security
17. Strategic significance of cyber and space: Seminar summary
18. Views Sought on Data Breach Notification
19. ICT: Building Better Security Systems at Canada Bay
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.