|
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz
by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)]. Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Privacy and data protection : a comparative analysis with special reference to the Malaysian proposed law / by Abu Bakar Munir, Siti Hajar Mohd. Yasin
by Abu Bakar Munir | Siti Hajar Mohd. Yasin [(j.a.)]. Publisher: Petaling Jaya : Sweet & Maxwell Asia, 2002Availability: Items available for loan: Taylor's Library-TU
[Call number: 342.5950858 ABU]
(1).
|
|
|
Information rights in practice : the non-legal professional's guide / Alan Stead
by Stead, Alan. Publisher: London : Facet Pub., 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 342.410662 STE 2008]
(1).
|
|
|
E-privacy and online data protection / Peter Carey ; precedents by Eduardo Ustaran.
by Carey, Peter, LL. M | Ustaran, Eduardo. Publisher: London : Butterworths, 2002Availability: Items available for loan: Taylor's Library-TU
[Call number: 342.410858 CAR]
(2), TC External Storage
[Call number: 342.410858 CAR]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.
by Shema, Mike | Johnson, Bradley C. Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHE]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.
by Landoll, Douglas J. Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2006]
(1).
|
|
|
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.
by Gordon, Lawrence A | Loeb, Martin P. Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 GOR]
(1).
|
|
|
Information security management handbook / Harold F. Tipton, Micki Krause, [editors].
by Tipton, Harold F | Krause, Micki. Edition: 6th ed.Publisher: Boca Raton, FL : Auerbach Publications, c2007-Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INF 2007]
(5).
|
|
|
Security metrics : a beginner's guide / Caroline Wong.
by Wong, Caroline. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WON 2012]
(3).
|
|
|
Confidential information law in Malaysia : cases and commentaries / by Juriah Abdul Jalil.
by Juriah Abdul Jalil. Edition: Rev. ed.Publisher: Petaling Jaya, Selangor : Sweet & Maxwell Asia, 2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 342.5950858 JUR 2003]
(2).
|
|
|
Anti-hacker tool kit / Mike Shema ... [et al.]
by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit. Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ANT 2006]
(2).
|
|
|
Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.
by Fried, Stephen, 1962-. Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 FRI 2010]
(2).
|
|
|
Principles of computer security : CompTIA security+ and beyond lab manual / Vincent Nestler ... [et al.]
by Nestler, Vincent J. Edition: 2nd ed.Publisher: San Francisco, CA : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRI 2011]
(1).
|
|
|
IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden.
by Hayden, Lance. Publisher: New York : McGraw Hill, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAY 2010]
(2).
|
|
|
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.
by Basin, David | Schaller, Patrick | Schläpfer, Michael. Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAS 2011]
(1).
|
|
|
Information sharing and data protection in the area of freedom, security and justice : towards harmonised data protection principles for information exchange at EU-level / Franziska Boehm.
by Boehm, Franziska. Publisher: Heidelberg : Springer, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 346.0664 BOE 2012]
(1).
|
|
|
Security policies and implementation issues / Rob Johnson with Mike Merkow.
by Johnson, Rob (Robert) | Merkow, Mark S. Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JOH 2011]
(1).
|
|
|
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.
by Jacobs, Jay (Data analyst) | Rudis, Bob. Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2014]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema.
by Shema, Mike. Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHE 2014]
(1).
|
|
|
Information technology law / Diane Rowland, Elizabeth Macdonald.
by Rowland, Diane | Macdonald, Elizabeth, LL. B [(j.a.)]. Edition: 2nd ed.Publisher: London : Cavendish Pub., 2000Availability: Items available for loan: Taylor's Library-TU
[Call number: 343.42099 ROW]
(4).
|