Your search returned 39 results.

Not what you expected? Check for suggestions
|
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.

by Calder, Alan, 1957- | Watkins, Steve, 1970-.

Edition: Sixth edition.Publisher: London ; Philadelphia, PA : Kogan Page, 2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAL 2015] (2).
Information security [electronic resource] : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors.

by Straub, Detmar W | Goodman, Seymour E | Baskerville, Richard | ebrary, Inc.

Publisher: Armonk, N.Y. : M.E. Sharpe, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.

by Antón, Philip S | ebrary, Inc.

Publisher: Santa Monica, CA : Rand, 2003Other title: Vulnerability assessment & mitigation methodology | Vulnerability assessment and mitigation methodology.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights) [electronic resource] / guest editor Mariemma Yagüe.

by Yague, Mariemma | ebrary, Inc.

Publisher: Bradford, England : Emerald Group Pub, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Information assurance and computer security [electronic resource] / edited by Johnson P. Thomas and Mohamed Essaaidi.

by NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco) | Essaaidi, Mohamed | Thomas, Johnson P | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Digital watermarking and steganography [electronic resource] / Ingemar J. Cox ... [et al.].

by Cox, I. J. (Ingemar J.) | ebrary, Inc.

Edition: 2nd ed.Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PFL 2007] (1).
Intelligent watermarking techniques [electronic resource] / editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain.

by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, L. C | ebrary, Inc.

Publisher: River Edge, N.J. : World Scientific, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8/2] (1).
Privacy protection and computer forensics [electronic resource] / Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A. Computer forensics and privacy | ebrary, Inc.

Edition: 2nd ed.Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Techniques and applications of digital watermarking and content protection [electronic resource] / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

by Arnold, Michael (Michael Konrad), 1964- | Schmucker, Martin | Wolthusen, Stephen D | ebrary, Inc.

Publisher: Boston : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Technology and privacy : the new landscape [electronic resource] / edited by Philip E. Agre and Marc Rotenberg.

by Agre, Philip | Rotenberg, Marc | ebrary, Inc.

Publisher: Cambridge, Mass. : MIT Press, c1997Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 323.44/83] (1).
Crackproof your software [electronic resource] : the best ways to protect your software against crackers / Pavol C̆ervĕn.

by Cerven, Pavol | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Implementing database security and auditing [electronic resource] / Roy [i.e. Ron] Ben Natan.

by Ben-Natan, Ron | ebrary, Inc.

Publisher: Boston : Digital Press, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).