AMA Education System

Your search returned 32 results.

Sort
Results
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Mastering network security / Chris Brenton by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Sybex 2003
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 B74 2003.

Image from Google Jackets
Ccnp security ips 642-627 : official cert guide / DAVID BURNS by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis Indianapolis, IN : Cisco Press 2012
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 B88 2012.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information assurance handbook : effective computer security and risk management strategies / Steven. Schou, Corey ; Hernandez by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Mcgrawhill. c2015
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 S36 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Information hiding in speech signals for secure communication / Zhijun Wu by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Syngress c2015
Availability: Items available for loan: Main Library (1)Call number: TK 7882 S65 W8 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Security information and event management (siem) implementation / ET AL. Mill.ER, DAVID R. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: S.I S.I.: McGraw-Hill. Companies 2011
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 S4425 2011.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
It auditing : using controls to protect information assets. 2d ed. / Chris et al. Davis by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: McGraw-Hill. 2011
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A93 D38 2011.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Basics of cyber security : computer and mobile device safety made easy, the / Michael Sammons, John ; Cross by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam Syngress c2017
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 S26 2017.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Managing online risk : apps, mobile and social media security / Deborah Gonzalez by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam Elsevier c2015
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 G67 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Management of information security / Michael E. Whitman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia Cengage Learning 2010
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 W5356 2010.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Industrial network security : securing criticial infrastructure networks for smart grid, scada and other industrial control systems. 2d ed / Joel Thomas Knapp, Eric D.; Langill by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier c2015
Availability: Items available for loan: Main Library (1)Call number: TS 156.8 K58 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
The cyber risk handbook : Antonucci Domenic Creating and measuring effective cybersecurity capabilities by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New Jersey John Wilet & Sons Inc. c2017
Availability: Items available for loan: Main Library (1)Call number: HD 30.38 A58 2017.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Principles of incident response & disaster recovery / Whitman, Michael E., Herbert J. Mattord, and Andrew Green by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia Cengage Learning c2014
Availability: Items available for loan: Main Library (1)Call number: HF 5548.37 W55 2014.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Supply chain risk management : Sigler, Ken, Dan Shoemaker, and Anne Kohnke Applying secure acquisition principles to ensure a trusted technology product by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: CRC PRESS c2018
Availability: Items available for loan: Main Library (1)Call number: HD 38.5 K64 2018.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Corporate computer security. 4th ed / Randall J. Panko, Raymond R.; Boyle by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: USA Pearson 2015
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 P36 2015.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Architecting secure sotfware systems / Asose K. Talukder by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: CRC Press 2009
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 T34 2009.

Image from Google Jackets
Hands-on ethical hacking & network defense. 3d ed / Michael T. Simpson by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cengage Learning c2017
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 S55 2017.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
The Complete guide to cybersecurity risks and controls / Anne Kohnke, Dan Shoemaker, and Ken Sigler by Series: Internal audit and IT audit
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, Taylor & Francis Group c2016
Availability: Items available for loan: Main Library (1)Call number: QA 76.9 A25 K63 2016.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Securing the cloud : cloud computer security techniques and tactics / Vic Winkler by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam Elsevier 2011
Availability: Items available for loan: Main Library (1)Call number: QA 76.585 W56 2011.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Security risk management / Evan Wheeler by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam Elsevier 2011
Availability: Items available for loan: Main Library (1)Call number: TK 5105.59 W48 2011.

Amazon cover image
Image from Amazon.com
Image from Google Jackets
The life, art, and times of damian domingo / LUCIANO P. R. SANTIAGO by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Philippines Quezon City: Vibal Foundation 2010
Availability: Items available for loan: Main Library (1)Call number: ND 1029 D65 S36 2010.

AMA Education System

  All rights Reserved
  AMA Education System
  © 2024

Follow Us

AMA Building 2, 59 Panay Ave., Bgy. Paligsahan, Diliman, Quezon City
(02) 8737 5545 (Head Office)
(02) 8656-0654 (AMA QC)
(02) 8844 3225 (AMA Makati)