Goodman,
Richard Baskerville, M.E. Sharpe, 2008, 0765623730, 9780765623737, . Continuing the tradition of
Journal of Management Information Systems, this strictly refereed series of research volumes offers
an unparalleled lasting record of the field of Information Systems. Featuring brand new material
specifically written for this series, each volume presents both knowledge aboutorganizational
systems, and methods for creating new knowledge in the discipline. To further the fields
continuing development, the series is designed to serve researchers as well as practitioners. AMIS
publishes several topical volumes each year, edited by leading authorities in the various subfields of
IS..
DOWNLOAD HERE
CISM Review Manual 2011 , Isaca, 2010, Computer security, 300 pages. .
Designing information systems security , Richard Baskerville, 1988, , 247 pages. .
Information systems development methodologies, techniques, and tools, D. E. Avison, Guy
Fitzgerald, 1988, , 323 pages. .
Building an Effective Information Security Policy Architecture , Sandy Bacik, May 20, 2008,
Computers, 368 pages. Information security teams are charged with developing and maintaining a
set of documents that will protect the assets of an enterprise from constant threats and risks. In ....
Information Security Improvements Needed in Treasury's Security Management Program, Robert F.
Dacey, 2008, , 36 pages. The Dept. of the Treasury relies heavily on information systems -- & on the
publics trust in its work. Information security is therefore critical to Treasury operations. In ....
Information Security 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009
Proceedings, Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna, Sep 29,
2009, Computers, 508 pages. This book constitutes the refereed proceedings of the 12th
International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy,
September 7-9, 2009. The ....
A Practical Guide to Managing Information Security , Steve Purser, Jan 1, 2004, Business &
Economics, 259 pages. This groundbreaking book helps you master the management of information
security, concentrating on the proactive recognition and resolution of the practical issues of ....
Digital Evidence and Computer Crime Forensic Science, Computers and the Internet, , 2004,
Computers, 690 pages. Required reading for anyone involved in computer investigations or
computer administration!.
Information Security Governance Simplified From the Boardroom to the Keyboard, Todd Fitzgerald,
Feb 2, 2012, Business & Economics, 431 pages. Security practitioners must be able to build
cost-effective security programs while also complying with government regulations. Information
Security Governance Simplified: From ....
Writing Information Security Policies , Scott Barman, 2002, Computers, 216 pages. Written in a
clear, easy-to-understand form that management can understand, without insulting the intelligence
of the technical reader. Great foundational reference on security ....
Fighting computer crime , Donn B. Parker, 1983, , 352 pages. Discusses how different types of
computer crimes are executed and considers ethical conflicts, corrections to inadequate laws, and
future possibilities of computer crime escalation.
Management of Information Security , Michael E. Whitman, Herbert J. Mattord, 2010, Computers,
592 pages. Designed for senior and graduate-level business and information systems students who
want to learn the management aspects of information security, this work includes extensive ....