Your search returned 126 results.

Not what you expected? Check for suggestions
|
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart.

Publisher: Hoboken, N.J. : Wiley : IEEE Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2011] (2).
Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert.

by Halpert, Ben, 1986-.

Publisher: Hoboken, N.J. : John Wiley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 AUD 2011] (1).
Communication in a wired world [videorecording] : be smart, be safe / Learning Seed, video production, Stage Fright ; writer & executive producer, Louise Welsh Schrank.

by Schrank, Louise Welsh | Porter, Olivia | Stage Fright Productions | Learning Seed Company.

Publisher: Chicago, IL : Learning Seed, c2009Other title: Be smart, be safe.Availability: Items available for loan: Taylor's Library-TU [Call number: 303.4833 COM 2009] (1).
Cyber security policy guidebook / Jennifer L. Bayuk ... [et al.].

by Bayuk, Jennifer L.

Publisher: Hoboken, N.J. : John Wiley, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CYB 2012] (1).
IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden.

by Hayden, Lance.

Publisher: New York : McGraw Hill, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAY 2010] (2).
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.

by Basin, David | Schaller, Patrick | Schläpfer, Michael.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAS 2011] (1).
Information sharing and data protection in the area of freedom, security and justice : towards harmonised data protection principles for information exchange at EU-level / Franziska Boehm.

by Boehm, Franziska.

Publisher: Heidelberg : Springer, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 346.0664 BOE 2012] (1).
WordPress 3 ultimate security [electronic resource] : protect your WordPress site and its network / Olly Connelly.

by Connelly, Olly | ebrary, Inc.

Publisher: Birmingham, U.K. : Packt Open Source, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll.

by Landoll, Douglas J.

Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2011] (1).
Information security, coding theory and related combinatorics [electronic resource] : information coding and combinatorics / edited by Dean Crnković and Vladimir Tonchev.

by Crnkovic, Dean | Tonchev, Vladimir | NATO Emerging Security Challenges Division | ebrary, Inc | Information Security and Related Combinatorics (2010 : Opatija, Croatia).

Publisher: Washington, D.C. : IOS Press, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Microsoft Data Protection Manager 2010 [electronic resource] : a practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010 / Steve Buchanan.

by Buchanan, Steve | ebrary, Inc.

Publisher: Birmingham, U.K. : Packt Enterprise Pub., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Genetic data and the law [electronic resource] : a critical perspective on privacy protection / Mark Taylor.

by Taylor, Mark, 1973 Mar. 26-.

Publisher: Cambridge : Cambridge University Press, 2012Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 344.04196] (1).
Security de-engineering : solving the problems in information risk management / Ian Tibble.

by Tibble, Ian.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 TIB 2012] (1).
Information technology law / Ian J. Lloyd.

by Lloyd, Ian J.

Edition: Sixth edition.Publisher: Oxford ; New York : Oxford University Press, [2011]Copyright date: ©2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 343.410999] (1).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike.

Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE 2014] (1).
Information technology law / Ian J. Lloyd.

by Lloyd, Ian J.

Edition: Seventh edition.Publisher: Oxford : Oxford University Press, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 343.410999 LLO 2014] (4).
Data management and security [electronic resource] : applications in medicine, science and engineering / editors, A. Rabasa, C.A. Brebbia, A. Bia.

by International Conference on Data Management and Security : Applications in Medicine, Sciences and Engineering (1st) | Rabasa, A | Brebbia, C. A | Bia, A.

Publisher: Southampton ; Boston : WIT Press, c2013Other title: Data.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.

by Rosado, David G, 1977- | IGI Global.

Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).