AMA Education System

Your search returned 35 results.

Sort
Results
Image from Google Jackets
Software forensics: collecting evidence from the scene of a digital crime / Robert M. Slade by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York McGraw - Hill 2004
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 S53 2004.

Image from Google Jackets
Computer security: 20 things every employee should know / Ben Rothke by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York McGraw - Hill 2004
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 R68 2004.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Mastering network security / Chris Brenton by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Sybex 2003
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 B74 2003.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information assurance handbook : effective computer security and risk management strategies / Steven. Schou, Corey ; Hernandez by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Mcgrawhill. c2015
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 S36 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Applied oracle security : developing secure database and middleware environments / ET AL. KNOX, DAVID C. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Mcgraw-Hill. Companies 2010
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 A67 2010.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
It auditing : using controls to protect information assets. 2d ed. / Chris et al. Davis by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: McGraw-Hill. 2011
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A93 D38 2011.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
A beginners guide malware rootkits botnets / Christopher C. Elisan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: McGraw-Hill. 2013
Availability: Items available for loan: Main Library (1)Call number: QA 76.76 C68 2013.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information governance and security : protecting and managing your companys proprietary information / Michael Iannarelli, John G.; O Shaughnessy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier c2014
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 I26 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information security science / Young Carl by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: US Elsevier Inc c2016
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 Y68 2016.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
The cert oracle secure coding standard for java / FRED ET AL. LONG by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New Jersey Pearson Education, Inc. 2012
Availability: Items available for loan: Main Library (1)Call number: QA 76.73 J38 C44 2012.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Management of information security / Michael E. Whitman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia Cengage Learning 2010
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 W5356 2010.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Industrial network security : securing criticial infrastructure networks for smart grid, scada and other industrial control systems. 2d ed / Joel Thomas Knapp, Eric D.; Langill by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier c2015
Availability: Items available for loan: Main Library (1)Call number: TS 156.8 K58 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Principles of incident response & disaster recovery / Whitman, Michael E., Herbert J. Mattord, and Andrew Green by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia Cengage Learning c2014
Availability: Items available for loan: Main Library (1)Call number: HF 5548.37 W55 2014.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Cybersecurity : engineering a secure information technology organization / Dan ; Sigler Kenneth Shoemaker by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cengage Learning c2015
Availability: Items available for loan: Main Library (1).

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Corporate computer security. 4th ed / Randall J. Panko, Raymond R.; Boyle by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: USA Pearson 2015
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 P36 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Casp : comptia advanced security practitioner study guide 2d ed / Michael Gregg by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Sybex 2014
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 G74 2014.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Architecting secure sotfware systems / Asose K. Talukder by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: CRC Press 2009
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 T34 2009.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
7 qualities of highly secure software, the / Paul Maro by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: CRC Press 2012
Availability: Items available for loan: Main Library (1)Call number: QA 76.76 D47 P38 2012.

Image from Google Jackets
Hands-on ethical hacking & network defense. 3d ed / Michael T. Simpson by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cengage Learning c2017
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 S55 2017.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
The Complete guide to cybersecurity risks and controls / Anne Kohnke, Dan Shoemaker, and Ken Sigler by Series: Internal audit and IT audit
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, Taylor & Francis Group c2016
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 K63 2016.

AMA Education System

  All rights Reserved
  AMA Education System
  © 2024

Follow Us

AMA Building 2, 59 Panay Ave., Bgy. Paligsahan, Diliman, Quezon City
(02) 8737 5545 (Head Office)
(02) 8656-0654 (AMA QC)
(02) 8844 3225 (AMA Makati)