Books on the topic 'Security control framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 43 books for your research on the topic 'Security control framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Find full textPresident's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.
Find full textFighting computer crime: A new framework for protecting information. New York: Wiley, 1998.
Find full textDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Find full textOttawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto: Centre for International and Security Studies, York University, 1998.
Find full textMarshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto,Canada: Centre for International and Security Studies, York University, 1998.
Find full textNemati, Hamid R. Privacy solutions and security frameworks in information protection. Hershey, PA: Information Science Reference, 2013.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Find full textOffice, General Accounting. Department of Energy: A framework for restructuring DOE and its missions : report to the Congress. Washington, D.C: The Office, 1995.
Find full textUnited States. Congress. Senate. Committee on Health, Education, Labor, and Pensions. Terror attacks: Are we prepared? : hearing before the Committee on Health, Education, Labor, and Pensions, United States Senate, One Hundred Eighth Congress, second session, on examining preparations for possible future terrorist attacks, focusing on a concept of operations plan, tailored to each national special security event, which establishes a framework for managing federal public health and medical assets and coordinating with state and local governments in an emergency, July 22, 2004. Washington: U.S. G.P.O., 2005.
Find full textOffice, General Accounting. Nuclear nonproliferation: Implementation of the U.S./North Korean agreed framework on nuclear issues : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. Washington, D.C. (Room 1100, 700 4th St. NW, Washington 20548-0001): GAO, 1997.
Find full textHelfrich, Denise, Lou Ronnau, Jason Frazier, and Paul Forbes. Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design (Networking Technology). Cisco Press, 2006.
Find full textParker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. Wiley & Sons, Incorporated, John, 2008.
Find full textInformation assurance technical framework: IATF. 2nd ed. [Linthicum, MD]: National Security Agency, 1999.
Find full textRienhoff, Otto. A Legal Framework for Security in European Health Care Telematics (Studies in Health Technology and Informatics, V. 74). Ios Pr Inc, 2000.
Find full textJ. & Masp Consulting Group Kuong. Implications of and Compliance to Sarbanes-Oxley & Other Acts: Strategy, Control Framework and Plan of Action (Enterprise Governance, Control, Audit, Security, Risk Management and Business Continuity). Management Advisory Pubns, 2004.
Find full textArms control and the rule of law: A framework for peace and security in outer space : Proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.
Find full textDefense inventory: Improved management framework needed to guide Navy best practice initiatives : report to congressional committees. Washington, D.C: The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textDefense inventory: Improved management framework needed to guide Army best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Navy best practice initiatives : report to congressional committees. Washington, D.C: The Office, 1999.
Find full textDefense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textNuclear nonproliferation: Implementation of the U.S./North Korean agreed framework on nuclear issues : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. Washington, D.C: The Office, 1997.
Find full textOffice, General Accounting. Nuclear nonproliferation: Implementation of the U.S./North Korean agreed framework on nuclear issues : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. Washington, D.C: The Office, 1997.
Find full textNuclear nonproliferation: Status of heavy fuel oil delivered to North Korea under the agreed framework : report to the Chairman, Committee on International Relations, House of Representatives. Washington, D.C: The Office, 1999.
Find full textOffice, General Accounting. Nuclear nonproliferation: Status of heavy fuel oil delivered to North Korea under the agreed framework : report to the Chairman, Committee on International Relations, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Nuclear nonproliferation: Status of heavy fuel oil delivered to North Korea under the agreed framework : report to the Chairman, Committee on International Relations, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textAbbott, Kenneth W., Bernhard Zangl, Duncan Snidal, and Philipp Genschel, eds. The Governor's Dilemma. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198855057.001.0001.
Full textDempsey, James X., and Fred H. Cate. Recommendations for Government and Industry. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0023.
Full textJaswal, Nipun. Mastering Metasploit: Exploit Systems, Cover Your Tracks, and Bypass Security Controls with the Metasploit 5. 0 Framework, 4th Edition. Packt Publishing, Limited, 2020.
Find full textNikoleta, Chalanouli. Part II Commentaries to Typical Sofa Rules, 27 Financing Operations. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198808404.003.0027.
Full textWeinblum, Sharon. The management of African asylum seekers and the imaginary of the border in Israel. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9781526107459.003.0007.
Full textSerena, Forlati. Part II Commercial Aspects of the Marine Environment, 11 The Contribution of UNODC to Ocean Governance. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198823964.003.0011.
Full textErika, De Wet. Military Assistance on Request and the Use of Force. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198784401.001.0001.
Full textJones, Kent. Populism and Trade. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190086350.001.0001.
Full textGilbert, Jérémie. Natural Resources and Human Rights. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198795667.001.0001.
Full textSamset, Knut, and Gro Holst Volden. Quality Assurance in Megaproject Management. Edited by Bent Flyvbjerg. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198732242.013.17.
Full textMazerolle, Paul, John Rynne, and Samara McPhedran. Exploring Imprisonment across Cross-National Contexts. Edited by John Wooldredge and Paula Smith. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199948154.013.4.
Full textBindemann, Markus, ed. Forensic Face Matching. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198837749.001.0001.
Full textDonald R, Rothwell, Elferink Alex G Oude, Scott Karen N, and Stephens Tim, eds. The Oxford Handbook of the Law of the Sea. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198715481.001.0001.
Full text