Your search returned 126 results.

Not what you expected? Check for suggestions
|
Information security [electronic resource] : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors.

by Straub, Detmar W | Goodman, Seymour E | Baskerville, Richard | ebrary, Inc.

Publisher: Armonk, N.Y. : M.E. Sharpe, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Information technology law : the law and society / Andrew Murray.

by Murray, Andrew, 1972-.

Edition: Third edition.Publisher: New York, NY : Oxford University Press, [2016]Copyright date: ©2016Availability: Items available for loan: Taylor's Library-TU [Call number: 343.4109944 MUR 2016] (3).
Writing security tools and exploits [electronic resource] / James C. Foster, Vincent Liu.

by Foster, James C | Liu, Vincent | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2006Other title: Writing security tools & exploits.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.

by Antón, Philip S | ebrary, Inc.

Publisher: Santa Monica, CA : Rand, 2003Other title: Vulnerability assessment & mitigation methodology | Vulnerability assessment and mitigation methodology.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Information technology law / Diane Rowland, Elizabeth Macdonald.

by Rowland, Diane | Macdonald, Elizabeth, LL. B [(j.a.)].

Edition: 3rd ed.Publisher: London : Cavendish Pub., c 2005Availability: Items available for loan: Taylor's Library-TU [Call number: 343.420999 ROW] (2).
The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace and Lawrence Webber.

by Wallace, Michael, 1960- | Webber, Larry | ebrary, Inc.

Publisher: New York : American Management Association, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 658.4/77] (1).
Engaging privacy and information technology in a digital age [electronic resource] / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.

by Waldo, James | Lin, Herbert | Millett, Lynette I | ebrary, Inc.

Publisher: Washington, D.C. : National Academies Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Introduction to information technology law / David I. Bainbridge.

by Bainbridge, David I [author.].

Edition: Sixth edition.Publisher: Harlow, England : Pearson Longman, 2008Other title: Information technology law.Availability: Items available for loan: Taylor's Library-TU [Call number: 343.410999 BAI 2008] (3).
Personal data protection : cases and commentary with applied syariʻah principles / Leo Desmond Pointon, Jeong Chun Phuoc.

by Pointon, Leo D [author.] | Phuoc, Jeong Chun [author.].

Publisher: Ampang, Selangor Darul Ehsan, Malaysia : CLJ Publication, 2012Availability: Items available for loan: Taylor's Library-TU [Call number: 342.5950858 POI 2012] (3).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
The business privacy law handbook [electronic resource] / Charles H. Kennedy.

by Kennedy, Charles H | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights) [electronic resource] / guest editor Mariemma Yagüe.

by Yague, Mariemma | ebrary, Inc.

Publisher: Bradford, England : Emerald Group Pub, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The digital person [electronic resource] : technology and privacy in the information age / Daniel J. Solove.

by Solove, Daniel J, 1972- | ebrary, Inc.

Publisher: New York : New York University Press, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 342.7308/58] (1).
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.

by Venkataramanan, Nataraj | Shriram, Ashwin.

Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 V461] (1).
Information assurance and computer security [electronic resource] / edited by Johnson P. Thomas and Mohamed Essaaidi.

by NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco) | Essaaidi, Mohamed | Thomas, Johnson P | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
For the record [electronic resource] : protecting electronic health information / Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Computer Science and Telecommmunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, 1997Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 651.5/04261] (1).
Digital watermarking and steganography [electronic resource] / Ingemar J. Cox ... [et al.].

by Cox, I. J. (Ingemar J.) | ebrary, Inc.

Edition: 2nd ed.Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PFL 2007] (1).