Your search returned 9 results.

Not what you expected? Check for suggestions
|
Information assurance and computer security [electronic resource] / edited by Johnson P. Thomas and Mohamed Essaaidi.

by NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco) | Essaaidi, Mohamed | Thomas, Johnson P | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Digital watermarking and steganography [electronic resource] / Ingemar J. Cox ... [et al.].

by Cox, I. J. (Ingemar J.) | ebrary, Inc.

Edition: 2nd ed.Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Privacy protection and computer forensics [electronic resource] / Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A. Computer forensics and privacy | ebrary, Inc.

Edition: 2nd ed.Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Techniques and applications of digital watermarking and content protection [electronic resource] / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

by Arnold, Michael (Michael Konrad), 1964- | Schmucker, Martin | Wolthusen, Stephen D | ebrary, Inc.

Publisher: Boston : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Data security in cloud computing [electronic resource] / Dr. Vimal Kumar (vkumar@waikato.ac.nz)*; Dr. Ryan Ko (ryan@waikato.ac.nz); Dr. Sivadon Chaisiri (chaisiri@waikato.ac.nz) [Eds].

by Kumar, Vimal | Chaisiri, Sivadon | Ko, Ryan.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
User-centric privacy and security in biometrics [electronic resource] / Claus Viuelhauer; claus.vielhauer@fh-brandenburg.de (Ed).

by Vielhauer, Claus.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart.

Publisher: Hoboken, N.J. : Wiley : IEEE Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2011] (2).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
A process for developing a common vocabulary in the information security area [electronic resource] / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.

by NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) | Knop, J. V. (Jan V.) | Salʹnikov, Alexey A | IAshchenko, V. V | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available