Your search returned 126 results.

Not what you expected? Check for suggestions
|
Rfid protocol design, optimization, and security for the internet of things [electronic resource] / Prof. Alex X. Liu (alexliu@cse.msu.edu).

by Liu, Alex X | Shahzad, Muhammad | Liu, Xiulong | Li, Keqiu.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Data security in cloud computing [electronic resource] / Dr. Vimal Kumar (vkumar@waikato.ac.nz)*; Dr. Ryan Ko (ryan@waikato.ac.nz); Dr. Sivadon Chaisiri (chaisiri@waikato.ac.nz) [Eds].

by Kumar, Vimal | Chaisiri, Sivadon | Ko, Ryan.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
User-centric privacy and security in biometrics [electronic resource] / Claus Viuelhauer; claus.vielhauer@fh-brandenburg.de (Ed).

by Vielhauer, Claus.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Iris and periocular biometric recognition [electronic resource] / Christian Rathgeb (christian.rathgeb@h-da.de)*; Christoph Busch (christoph.busch@hig.no) (Eds).

by Rathgeb, Christian | Busch, Christoph.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The Unaccountable State of Surveillance: Exercising Access Rights in Europe.

by Norris, Clive | Hert, Paul de | L'Hoiry, Xavier | Galetta, Antonella.

Publisher: [Place of publication not identified] : Springer Science and Business Media : Springer, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 342.40858] (1).
Investigating European fraud in the EU member states / edited by Alessandro Bernardi and Daniele Negri.

by Bernardi, Alessandro [editor.] | Negri, Daniele, 1971- [editor.].

Publisher: Oxford [UK] ; Portland, Oregon : Hart Publishing, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 363.25/963094] (1).
Protection of workers' personal data [electronic resource].

by ebrary, Inc.

Publisher: Geneva : International Labour Office, 1997Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Research ethics committees, data protection, and medical research in European countries / edited by D. Beyleveld, D. Townend and J. Wright.

by Beyleveld, Deryck [editor.] | Townend, D. (David) [editor.] | Wright, J. (Jessica) [editor.].

Publisher: Abingdon, Oxon : Routledge, Taylor & Francis Group, 2016Copyright date: ©2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 342.2408/58] (1).
Courts, privacy and data protection in the digital environment [electronic resource] / edited by Maja Brkan and Evangelia Psychogiopoulou.

by Brkan, Maja | Psychogiopoulou, Evangelia.

Publisher: Cheltenham, UK : Edward Elgar Publishing Limited, ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 346.4038] (1).
Data localization laws and policy [electronic resource] : the EU data protection international transfers restriction through a cloud computing lens / W. Kuan Hon.

by Hon, W. Kuan.

Publisher: Cheltenham, UK : Edward Elgar Publishing Limited, ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 342.0858] (1).
Identity, security and democracy [electronic resource] : the wider social and ethical implications of automated systems for human identification / edited by Emilio Mordini and Manfred Green.

by NATO Advanced Research Workshop on Identity, Security and Democracy: the Wider Social and Ethical Implications of Automated Systems for Human Identification (2006 : Jerusalem) | Green, Manfred | Mordini, E. (Emilio) | ebrary, Inc.

Publisher: Amsterdam ; Oxford : IOS Press, 2009Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security metrics : a beginner's guide / Caroline Wong.

by Wong, Caroline.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WON 2012] (3).
Confidential information law in Malaysia : cases and commentaries / by Juriah Abdul Jalil.

by Juriah Abdul Jalil.

Edition: Rev. ed.Publisher: Petaling Jaya, Selangor : Sweet & Maxwell Asia, 2003Availability: Items available for loan: Taylor's Library-TU [Call number: 342.5950858 JUR 2003] (2).
Practical risk management for the CIO / Mark Scherling.

by Scherling, Mark.

Publisher: Boca Raton, FL : Auerbach Publications, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 SCH 2011] (1).
Anti-hacker tool kit / Mike Shema ... [et al.]

by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit.

Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ANT 2006] (2).
Personal data protection in Malaysia : law and practice / Abu Bakar Munir, Siti Hajar Mohd Yasin.

by Abu Bakar Munir | Siti Hajar Mohd. Yasin.

Publisher: Petaling Jaya : Sweet & Maxwell Asia/Thomson Reuters Malaysia, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 342.5950858 ABU 2010] (4).
Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.

by Fried, Stephen, 1962-.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FRI 2010] (2).
Privacy and information rights / edited by Justin Healey.

by Healey, Justin.

Publisher: Thirroul, N.S.W. : Spinney Press, 2012Availability: Items available for loan: Taylor's Library-TC [Call number: 323.4480994 PRI 2012] (2).
Principles of computer security : CompTIA security+ and beyond lab manual / Vincent Nestler ... [et al.]

by Nestler, Vincent J.

Edition: 2nd ed.Publisher: San Francisco, CA : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2011] (1).