|
|
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.
by Calder, Alan, 1957- | Watkins, Steve, 1970-. Edition: Sixth edition.Publisher: London ; Philadelphia, PA : Kogan Page, 2015Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CAL 2015]
(2).
|
|
|
Information security [electronic resource] : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors.
by Straub, Detmar W | Goodman, Seymour E | Baskerville, Richard | ebrary, Inc. Publisher: Armonk, N.Y. : M.E. Sharpe, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.
by Antón, Philip S | ebrary, Inc. Publisher: Santa Monica, CA : Rand, 2003Other title: Vulnerability assessment & mitigation methodology | Vulnerability assessment and mitigation methodology.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Cloud computing security : foundations and challenges / editor, John R. Vacca.
by Vacca, John R, 1947-. Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 C647]
(1).
|
|
|
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights) [electronic resource] / guest editor Mariemma Yagüe.
by Yague, Mariemma | ebrary, Inc. Publisher: Bradford, England : Emerald Group Pub, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Information assurance and computer security [electronic resource] / edited by Johnson P. Thomas and Mohamed Essaaidi.
by NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco) | Essaaidi, Mohamed | Thomas, Johnson P | ebrary, Inc. Publisher: Amsterdam ; Washington, DC : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Digital watermarking and steganography [electronic resource] / Ingemar J. Cox ... [et al.].
by Cox, I. J. (Ingemar J.) | ebrary, Inc. Edition: 2nd ed.Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.
by Landoll, Douglas J. Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2006]
(1).
|
|
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence. Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PFL 2007]
(1).
|
|
|
Intelligent watermarking techniques [electronic resource] / editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain.
by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, L. C | ebrary, Inc. Publisher: River Edge, N.J. : World Scientific, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8/2]
(1).
|
|
|
Privacy protection and computer forensics [electronic resource] / Michael A. Caloyannides.
by Caloyannides, Michael A | Caloyannides, Michael A. Computer forensics and privacy | ebrary, Inc. Edition: 2nd ed.Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Techniques and applications of digital watermarking and content protection [electronic resource] / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
by Arnold, Michael (Michael Konrad), 1964- | Schmucker, Martin | Wolthusen, Stephen D | ebrary, Inc. Publisher: Boston : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Technology and privacy : the new landscape [electronic resource] / edited by Philip E. Agre and Marc Rotenberg.
by Agre, Philip | Rotenberg, Marc | ebrary, Inc. Publisher: Cambridge, Mass. : MIT Press, c1997Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 323.44/83]
(1).
|
|
|
Crackproof your software [electronic resource] : the best ways to protect your software against crackers / Pavol C̆ervĕn.
by Cerven, Pavol | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Implementing database security and auditing [electronic resource] / Roy [i.e. Ron] Ben Natan.
by Ben-Natan, Ron | ebrary, Inc. Publisher: Boston : Digital Press, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.
by Gordon, Lawrence A | Loeb, Martin P. Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 GOR]
(1).
|