Search results for: Kovacich, Gerald L.
Showing 1 - 19 results of 19
Refine Results
-
1
The information systems security officer's guide : establishing and managing an information protection program
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 1998Physical Description: xiv, 172 pages : illustrations ; 24 cmHoldings: Loading…
Book Loading… -
2
High-technology-crime investigator's handbook : working in the global information environment
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 2000Physical Description: xix, 298 pages : illustrations ; 21 cmHoldings: Loading…
Book Loading… -
3
The manager's handbook for corporate security : establishing and managing a successful assets protection program
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 2003Physical Description: xxi, 463 pages : illustrations ; 24 cmHoldings: Loading…
Book Loading… -
4
Security metrics management : how to measure the costs and benefits of security
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 2006Physical Description: xxviii, 323 pages : illustrations ; 27 cmHoldings: Loading…
Book Loading… -
5
Security metrics management how to measure the costs and benefits of security
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 2006Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2005 (Ebook Central @ Proquest)
EBSCO eBooks: 2006 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2006 (EBSCO)
Electronic eBook -
6
Fighting fraud how to establish and manage an anti-fraud program
Authors: Kovacich, Gerald L.
Published: Elsevier/Butterworth-Heinemann, 2008Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2007 (Ebook Central @ Proquest)
EBSCO eBooks: 2008 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2008 (EBSCO)
Electronic eBook -
7
High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann/Elsevier, 2006Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2006 (Ebook Central @ Proquest)
EBSCO eBooks: 2006 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2006 (EBSCO)
Electronic eBook -
8
The information systems security officer's guide establishing and managing an information protection program
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 2003Holdings: Loading…EBSCO eBooks: 2003 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2003 (EBSCO)
Electronic eBook -
9
The Information Systems security officer's guide establishing and managing a cyber security program
Authors: Kovacich, Gerald L.
Published: Butterworth-Heinemann, 2016Holdings: Loading…ScienceDirect eBooks - Forensics and Security 2016: 2016 (ScienceDirect)
Electronic eBook -
10
Global information warfare : the new digital battlefield
Authors: Jones, Andy, 1952-, Kovacich, Gerald L.
Published: CRC Press/ Taylor & Francis Group, 2016Physical Description: xxxix, 363 pages : illustrations ; 24 cmHoldings: Loading…
Book Loading… -
11
Security metrics management measuring the effectiveness and efficiency of a security program
Authors: Kovacich, Gerald L., Halibozek, Edward P.
Published: Butterworth-Heinemann is an imprint of Elsevier, 2017Holdings: Loading…ScienceDirect eBooks - Forensics and Security 2017: 2017 (ScienceDirect)
Electronic eBook -
12
The manager's handbook for corporate security establishing and managing a successful assets protection program
Authors: Kovacich, Gerald L., Halibozek, Edward P.
Published: Butterworth-Heinemann is an imprint of Elsevier, 2017Holdings: Loading…ScienceDirect eBooks - Forensics and Security 2017: 2017 (ScienceDirect)
Electronic eBook -
13
I-way robbery : crime on the Internet
Authors: Boni, William C.Other Authors: “…Kovacich, Gerald L.…”
Published: Butterworth-Heinemann, 1999
Physical Description: xv, 240 pages : illustrations ; 24 cmHoldings: Loading…
Book Loading… -
14
Netspionage : the global threat to information
Authors: Boni, William C.Other Authors: “…Kovacich, Gerald L.…”
Published: Butterworth-Heinemann, 2000
Physical Description: xx, 260 pages : illustrations ; 24 cmHoldings: Loading…
Book Loading… -
15
Mergers and acquisitions security : corporate restructuring and security management
Authors: Halibozek, Edward P.Other Authors: “…Kovacich, Gerald L.…”
Published: Elsever Butterworth Heinemann, 2005
Physical Description: xxii, 250 pages : illustrations ; 23 cmHoldings: Loading…Connect to: Table of contents - All users (Cataloging @ Library of Congress)
Book -
16
Mergers and acquisitions security corporate reorganizations and security management
Authors: Halibozek, Edward P.Other Authors: “…Kovacich, Gerald L.…”
Published: Elsever Butterworth Heinemann, 2005
Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2005 (Ebook Central @ Proquest)
EBSCO eBooks: 2005 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2005 (EBSCO)
Electronic eBook -
17
Information assurance security in the information environment
Authors: Blyth, Andrew, 1966-Other Authors: “…Kovacich, Gerald L.…”
Published: Springer, 2006
Holdings: Loading…Springer English/International eBooks 2006 - Full Set: 2006 (Springer Link)
Electronic eBook -
18
The corporate security professional's handbook on terrorism
Authors: Halibozek, Edward P.Other Authors:
Published: Butterworth Heinemann, 2008Physical Description: xvii, 261 pages : illustrations ; 26 cmHoldings: Loading…
Book Loading… -
19
The corporate security professional's handbook on terrorism
Authors: Halibozek, Edward P.Other Authors:
Published: Butterworth Heinemann, 2008Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2007 (Ebook Central @ Proquest)
EBSCO eBooks: 2008 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2008 (EBSCO)
Electronic eBook
Related Subjects
Security measures
Corporations
Private security services
Computer security
Computer crimes
Management
Prevention
Costs
Security systems
Confidential business information
Consolidation and merger of corporations
Corporate divestiture
Data protection
Internet
Investigation
Security consultants
Terrorism
Access control
Business
Commercial crimes
Computer networks
Computers
Criminal investigation
Data processing
Electronic data processing departments
Fraud
Fraud investigation
High technology
Information warfare