Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.
Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders.
Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.
T58.5-58.64 Information technology
QA75.5-76.95 Electronic computers. Computer science