Your search returned 21 results.

Not what you expected? Check for suggestions
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)].

Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Privacy and data protection : a comparative analysis with special reference to the Malaysian proposed law / by Abu Bakar Munir, Siti Hajar Mohd. Yasin

by Abu Bakar Munir | Siti Hajar Mohd. Yasin [(j.a.)].

Publisher: Petaling Jaya : Sweet & Maxwell Asia, 2002Availability: Items available for loan: Taylor's Library-TU [Call number: 342.5950858 ABU] (1).
Information rights in practice : the non-legal professional's guide / Alan Stead

by Stead, Alan.

Publisher: London : Facet Pub., 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 342.410662 STE 2008] (1).
E-privacy and online data protection / Peter Carey ; precedents by Eduardo Ustaran.

by Carey, Peter, LL. M | Ustaran, Eduardo.

Publisher: London : Butterworths, 2002Availability: Items available for loan: Taylor's Library-TU [Call number: 342.410858 CAR] (2), TC External Storage [Call number: 342.410858 CAR] (1).
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.

by Shema, Mike | Johnson, Bradley C.

Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
Information security management handbook / Harold F. Tipton, Micki Krause, [editors].

by Tipton, Harold F | Krause, Micki.

Edition: 6th ed.Publisher: Boca Raton, FL : Auerbach Publications, c2007-Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INF 2007] (5).
Security metrics : a beginner's guide / Caroline Wong.

by Wong, Caroline.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WON 2012] (3).
Confidential information law in Malaysia : cases and commentaries / by Juriah Abdul Jalil.

by Juriah Abdul Jalil.

Edition: Rev. ed.Publisher: Petaling Jaya, Selangor : Sweet & Maxwell Asia, 2003Availability: Items available for loan: Taylor's Library-TU [Call number: 342.5950858 JUR 2003] (2).
Anti-hacker tool kit / Mike Shema ... [et al.]

by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit.

Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ANT 2006] (2).
Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.

by Fried, Stephen, 1962-.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FRI 2010] (2).
Principles of computer security : CompTIA security+ and beyond lab manual / Vincent Nestler ... [et al.]

by Nestler, Vincent J.

Edition: 2nd ed.Publisher: San Francisco, CA : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2011] (1).
IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden.

by Hayden, Lance.

Publisher: New York : McGraw Hill, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAY 2010] (2).
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.

by Basin, David | Schaller, Patrick | Schläpfer, Michael.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAS 2011] (1).
Information sharing and data protection in the area of freedom, security and justice : towards harmonised data protection principles for information exchange at EU-level / Franziska Boehm.

by Boehm, Franziska.

Publisher: Heidelberg : Springer, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 346.0664 BOE 2012] (1).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike.

Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE 2014] (1).
Information technology law / Diane Rowland, Elizabeth Macdonald.

by Rowland, Diane | Macdonald, Elizabeth, LL. B [(j.a.)].

Edition: 2nd ed.Publisher: London : Cavendish Pub., 2000Availability: Items available for loan: Taylor's Library-TU [Call number: 343.42099 ROW] (4).