Your search returned 66 results.

41.
Cyber Security Policy Guidebook.

by Bayuk, Jennifer L | Healey, Jason | Rohmeyer, Paul | Sachs, Marcus H | Schmidt, Jeffrey | Weiss, Joseph.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

42.
Use of Risk Analysis in Computer-Aided Persuasion.

by Duman, E | Atiya, A.

Series: NATO Science for Peace and Security Series E: Human and Societal DynamicsMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : IOS Press, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :

43.
Death of the Internet.

by Jakobsson, Markus.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Piscataway : Wiley, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

44.
Waiving Our Rights : The Personal Data Collection Complex and Its Threat to Privacy and Civil Liberties.

by Lee, Orlan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Blue Ridge Summit : Lexington Books, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

45.
WordPress 3 Ultimate Security.

by Connelly, Olly.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Olton : Packt Publishing Ltd, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :

46.
Microsoft Data Protection Manager 2010.

by Buchanan, Steve.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Olton : Packt Publishing Ltd, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :

47.
Active Directory Disaster Recovery.

by Rommel, Florian.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Olton : Packt Publishing Ltd, 2008Copyright date: ©2008Online access: Click to View Availability: No items available :

48.
Governance, Risk, and Compliance Handbook for Oracle Applications.

by King, Nigel | Khan, Adil.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Olton : Packt Publishing Ltd, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

49.
Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program.

by Ladley, John.

Series: The Morgan Kaufmann Series on Business Intelligence SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Francisco : Elsevier Science & Technology, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

50.
Network Backup with Bacula How-To.

by Pankov, Eugene.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Birmingham : Packt Publishing Ltd, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

51.
Information Warfare.

by Ventre, Daniel.

Series: IsteEdition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley & Sons, Incorporated, 2013Copyright date: ©2009Online access: Click to View Availability: No items available :

52.
Introduction to Cyber-Warfare : A Multidisciplinary Approach.

by Shakarian, Paulo | Ruef, Andrew | Shakarian, Jana.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : William Andrew, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :

53.
Oracle Data Guard 11gR2 Administration Beginner's Guide.

by Baransel, Emre | Basha, Nassyam.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Olton : Packt Publishing Ltd, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :

54.
Information Security Management Principles.

by Alexander, David | Finch, Amanda | Taylor, Andy | Sutton, David | Taylor, Andy.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Swindon : BCS Learning & Development Limited, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :

55.
Perspectives on Privacy : Increasing Regulation in the USA, Canada, Australia and European Countries.

by Dörr, Dieter | Weaver, Russell L.

Series: Media Convergence / Medienkonvergenz SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Boston : De Gruyter, Inc., 2014Copyright date: ©2014Online access: Click to View Availability: No items available :

56.
Total Information Risk Management : Maximizing the Value of Data and Information Assets.

by Borek, Alexander | Parlikad, Ajith Kumar | Webb, Jela | Woodall, Philip.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Francisco : Elsevier Science & Technology, 2013Copyright date: ©2014Online access: Click to View Availability: No items available :

57.
Getting Started with FortiGate.

by Fabbri, Rosato | Volpe, Fabrizio.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Birmingham : Packt Publishing Ltd, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :

58.
The NSA Report : Liberty and Security in a Changing World.

by Staff, President's Review Group on Intelligence and Communications Technologies | Clarke, Richard A | Morell, Michael J | Stone, Geoffrey R | Sunstein, Cass R | Swire, Peter.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Princeton : Princeton University Press, 2014Copyright date: ©2014Online access: Click to View Availability: No items available :

59.
Advances in Artificial Intelligence for Privacy Protection and Security.

by Solanas, Agusti | Martinez-balleste, Antoni.

Series: Intelligent Information Systems SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : World Scientific Publishing Co Pte Ltd, 2009Copyright date: ©2009Online access: Click to View Availability: No items available :

60.
Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization.

by Schriever, Karl-Heinz | Schröder, Markus.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Boston : De Gruyter, Inc., 2014Copyright date: ©2014Online access: Click to View Availability: No items available :

Powered by Koha