Your search returned 66 results.

1.
Information assurance : managing organisational IT security risks / Joseph G. Boyce, Dan W. Jennings.

by Boyce, Joseph George | Jennings, Dan Wesley.

Material type: Text Text Publication details: Armsterdam : Butterworth-Heinemann, 2002Availability: Items available for loan: Main LibraryCall number: QA 76.9.A25 BOY (1).

2.
Securing PCs and data in libraries and schools : a handbook with menuing, anti-virus, and other protective software / Allen C. Benson.

by Benson, Allen C.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Neal-Schuman Publishers, c1997Availability: Items available for loan: Main LibraryCall number: QA 76.9.A25 BEN (5).

3.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Main LibraryCall number: QA 76.9 PFL (3).

4.
Managing cybersecurity resources : a cost-benefit analysis / Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2006Availability: Items available for loan: Main LibraryCall number: HF 5548.37 GOR (2).

5.
International Data Flows and Privacy [electronic resource] : The Conflict and Its Resolution / Mattoo, Aaditya.

by Mattoo, Aaditya | Mattoo, Aaditya | Meltzer, Joshua P.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Washington, D.C. : The World Bank, 2018Online access: Click here to access online Availability: No items available :

6.
International Data Flows and Privacy [electronic resource] : The Conflict and Its Resolution / Mattoo, Aaditya.

by Mattoo, Aaditya | Mattoo, Aaditya | Meltzer, Joshua P.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Washington, D.C. : The World Bank, 2018Online access: Click here to access online Availability: No items available :

7.
Finding and Fixing Vulnerabilities in Information Systems : The Vulnerability Assessment and Mitigation Methodology.

by Anton, Philip S | Anderson, Robert H | Mesic, Richard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Santa Monica : RAND Corporation, The, 2004Copyright date: ©2003Online access: Click to View Availability: No items available :

8.
Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation.

by Kahn, Miriam B.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Chicago : ALA Editions, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :

9.
Black Hat Physical Device Security : Exploiting Hardware and Software.

by Miller, Drew.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : William Andrew, 2005Copyright date: ©2004Online access: Click to View Availability: No items available :

10.
Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications.

by Arnold, Michael | Schmucker, Martin | Wolthusen, Stephen.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Norwood : Artech House, 2003Copyright date: ©2003Online access: Click to View Availability: No items available :

11.
Privacy Protection and Computer Forensics.

by Caloyannides, Michael.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Norwood : Artech House, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :

12.
Intelligent Watermarking Techniques : Series On Innovative Intelligence.

by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, L. C.

Series: Series on Innovative Intelligence SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : World Scientific Publishing Co Pte Ltd, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :

13.
Practical Guide to Managing Information Security.

by Purser, Steve.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Norwood : Artech House, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :

14.
Writing Security Tools and Exploits.

by Foster, James C.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Kidlington : William Andrew, 2006Copyright date: ©2005Online access: Click to View Availability: No items available :

15.
Crackproof Your Software : Protect Your Software Against Crackers.

by Cerven, Pavol.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Francisco : No Starch Press, Incorporated, 2002Copyright date: ©2002Online access: Click to View Availability: No items available :

16.
Security Law and Methods.

by Pastor, James F.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington : Elsevier Science & Technology, 2006Copyright date: ©2007Online access: Click to View Availability: No items available :

17.
Data protection & Consumer Privacy.

by Group, Emerald.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Bradford : Emerald Publishing Limited, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :

18.
Implementing Database Security and Auditing : A Guide for DBAs, Information Security Administrators and Auditors.

by Ben-Natan, Ron | Ben Natan, Ron.

Edition: 5th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington : Elsevier Science & Technology, 2005Copyright date: ©2005Online access: Click to View Availability: No items available :

19.
Information Assurance and Computer Security.

by Thomas, J.P | Essaaidi, M.

Series: NATO Security through Science Series - D: Information and Communication SecurityMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : IOS Press, 2006Copyright date: ©2006Online access: Click to View Availability: No items available :

20.
Papers from the First European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights’06).

by Yague, Mariemma.

Series: Online Information ReviewMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Bradford : Emerald Publishing Limited, 2007Copyright date: ©2007Online access: Click to View Availability: No items available :

Powered by Koha