174 results on '"Computer security--Management"'
Search Results
2. Leveraging partnerships for microcredential design in digital health: Key success factors
3. Safeguarding patient information as an issue faced by nurses: A policy brief
4. For-profit versus non-profit cybersecurity posture: Breach types and locations in healthcare organisations
5. Cybersecurity and AI - O Brave New World
6. Cybersecurity in the digital age
7. How to create an infostructure to protect data as a utility
8. It's time to get our heads out of the sand and into the cloud
9. It's time to get our heads out of the sand and into the cloud
10. Professionalising cybersecurity professionals: Why it needs to happen
11. Acting for you, April 2024
12. Unveiling business activity patterns of digital transformation through K-means clustering with Universal Sentence Encoder in transport and logistics sectors
13. Barriers to digital transformation: The case of Moroccan companies
14. CEO memo October - Cyber security standards and awareness to help mitigate risks for your organisation
15. Electronically tracking and neutralising a naval adversary
16. When held to ransom: Legal implications of ransomware attacks for legal practitioners and their clients
17. When held to ransom: Legal implications of ransomware attacks for legal practitioners and their clients
18. Managing third-party risk
19. Bridging data privacy and cybersecurity (no they're not the same thing)
20. A brief review on attack design and detection strategies for networked cyber-physical systems
21. AI emerges as potential cyber defence
22. Ceo memo July -strengthening cyber governance
23. Cybersecurity risk management - safeguarding your licence to operate
24. Cyber security: Keeping your business and people safe online
25. Governing cybersecurity: Critical infrastructure, spies and consumers
26. An analysis of the Law Society of South Australia's Cloud Computing Guidelines: Data security
27. SecTech roadshow shows what security has to offer
28. Is your mining machinery at risk of a cyberattack?
29. Cyber Investigations of Smart Devices
30. Security: How to have trust in the security of smart home devices?
31. Enterprise Cyber Risk Management As a Value Creator : Leverage Cybersecurity for Competitive Advantage
32. Cyber Guardians : Empowering Board Members for Effective Cybersecurity
33. Building a Cyber Risk Management Program
34. Cyber CISO Marksmanship : Hitting the Mark in Cybersecurity Leadership
35. The CISO Playbook
36. Microsoft 365 Security and Compliance for Administrators : A Definitive Guide to Planning, Implementing, and Maintaining Microsoft 365 Security Posture
37. Security Chaos Engineering
38. Cyber Security and Operations Management for Industry 4.0
39. Computational Intelligence for Cybersecurity Management and Applications
40. Microsoft 365 Security, Compliance, and Identity Administration : Plan and Implement Security and Compliance Strategies for Microsoft 365 and Hybrid Environments
41. Project Zero Trust : A Story About a Strategy for Aligning Security and the Business
42. Digital Identity Management in Formal Education : Implications for Policy and Decision-Making
43. A Comprehensive Guide to Information Security Management and Audit
44. Shields Up : Cybersecurity Project Management
45. Cyberinsurance Policy : Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
46. Cybersecurity Management : An Organizational and Strategic Approach
47. The CISO’s Transformation : Security Leadership in a High Threat Landscape
48. Advances in Cybersecurity Management
49. Infosec Strategies and Best Practices : Gain Proficiency in Information Security Using Expert-level Strategies and Best Practices
50. Incident Response in the Age of Cloud : Techniques and Best Practices to Effectively Respond to Cybersecurity Incidents
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.