AMA Education System

Your search returned 10 results.

Sort
Results
Image from Google Jackets
Software forensics: collecting evidence from the scene of a digital crime / Robert M. Slade by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York McGraw - Hill 2004
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 S53 2004.

Image from Google Jackets
Computer security: 20 things every employee should know / Ben Rothke by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York McGraw - Hill 2004
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 R68 2004.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information assurance handbook : effective computer security and risk management strategies / Steven. Schou, Corey ; Hernandez by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Mcgrawhill. c2015
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 S36 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information governance and security : protecting and managing your companys proprietary information / Michael Iannarelli, John G.; O Shaughnessy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier c2014
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 I26 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Detectiong and combating malicious email / Julie JCH Ryan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: USA Elsevier Inc c2015
Availability: Items available for loan: Main Library (1)Call number: QA 76.9.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Supply chain risk management : Sigler, Ken, Dan Shoemaker, and Anne Kohnke Applying secure acquisition principles to ensure a trusted technology product by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: CRC PRESS c2018
Availability: Items available for loan: Main Library (1)Call number: HD 38.5 K64 2018.

Image from Google Jackets
A Primer : the cybercrime prevention act of 2012., and the Data Privacy Act of 2012 / Aguda, Henry Rhoel R. and Tiojanco, Bryan Dennis by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: UP Law Complex 2013
Availability: Items available for loan: Main Library (1)Call number: KF 390.5 C65 A42 2013.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information security analytics : finding security insights, patterns and anomalies in big data / Mark Ryan M. et al Talabis by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Syngress c2015
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 I54 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
How To Define And Build An Effective Cyber Threat Intelligence Capability by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA Syngress c2015
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 2015.

Local cover image
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Introduction to cybersecurity / Jake R. Pomperada and Jason V. Castellano by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Intramuros, Manila : Unlimited Books Library Services & Publishing Inc., 2023
Availability: Items available for loan: Main Library (1)Call number: (Fi) QA 76.9 P66 2023.

AMA Education System

  All rights Reserved
  AMA Education System
  © 2024

Follow Us

AMA Building 2, 59 Panay Ave., Bgy. Paligsahan, Diliman, Quezon City
(02) 8737 5545 (Head Office)
(02) 8656-0654 (AMA QC)
(02) 8844 3225 (AMA Makati)