IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 31 - 40 of total 158 results.- 31CISSP STUDY GUIDE
Author(s): ERIC CONRAD, SETH MISENAR, JOSHUA FELDMAN
Publisher: SYNGRESS (Publication Year:2016)
Subject(s): COMPUTER NETWORKS, ELECTRONIC DATA PROCESSING, EXAMINATIONS
Call No: 005.8 CON
Accession No: 96080 - 32CYBER GUERILLA
Author(s): JELLE VAN HAASTER, RICKEY GEVERS, MARTIJN SPRENGERS
Publisher: SYNGRESS (Publication Year:2016)
Subject(s): COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 HAA
Accession No: 94652 - 33HARDWARE SECURITY: A HANDS-ON LEARNING APPROACH
Author(s): SWARUP BHUNIA, MARK TEHRANIPOOR
Publisher: MORGAN KAUFMANN (Publication Year:2019)
Subject(s): COMPUTER SECURITY
Call No: 005.8 BHU
Accession No: 101561 - 34READING IN INFORMATION SYSTEMS RISK AND SECURITY: FOR SWINBURNE UNIVERSITY
Author(s): MICHAEL E. WHITMAN, HERBERT J. MATTORD
Publisher: THOMSON-SOUTH-WESTERN (Publication Year:2007)
Subject(s): INFORMATION SYSTEMS, INFORMATION SYSTEM-RISKS, INFORMATION SYSTEM-SECURITY
Call No: 005.8 WHI
Accession No: 79850 - 35KNOW YOUR ENEMY: LEARNING ABOUT SECURITY THREATS (WITH CD-ROM)
Publisher: ADDISON-WESLEY PUBLISHING COMPANY (Publication Year:2001)
Call No: 005.8 KNO
Accession No: 75858 - 36PRIVACY IS HARD AND SEVEN OTHER MYTHS: ACHIEVING PRIVACY THROUGH CAREFUL DESIGN
Author(s): JAAP-HENK HOEPMAN
Publisher: MIT PRESS (Publication Year:2021)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, PRIVACY, RIGHT OF
Call No: 005.8 HOE
Accession No: 103796 - 37THE ART OF INVISIBILITY: THE WORLD'S MOST FAMOUS HACKER TEACHES YOU HOW TO BE SAFE IN THE AGE OF BIG BROTHER AND BIG DATA
Author(s): KEVIN MITNICK, ROBERT VAMOSI
Publisher: BACK BAY BOOKS (Publication Year:2019)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, INTERNET - SECURITY MEASURES
Call No: 005.8 MIT
Accession No: 103593 - 38RECENT ADVANCES IN SECURITY, PRIVACY AND TRUST FOR INTERNET-OF-THINGS (IOT) AND CYBER-PHYSICAL SYSTEMS (CPS)
Author(s): BRIJ B. GUPTA, DHARMA P. AGRAWAL, KUAN-CHING LI
Publisher: CRC PRESS (Publication Year:2021)
Subject(s): COMPUTER SECURITY, INTERNET - SECURITY MEASURES, INTERNET OF THINGS
Call No: 005.8 LI
Accession No: 102634 - 39CYBERSECURITY FUNDAMENTALS: A REAL-WORLD PERSPECTIVE
Author(s): KUTUB THAKUR, AL-SAKIB KHAN PATHAN
Publisher: CRC PRESS (Publication Year:2020)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 THA
Accession No: 102629 - 40COUNTERING CYBER SABOTAGE: INTRODUCING CONSEQUENCE-DRIVEN, CYBER-INFORMED ENGINEERING (CCE)
Author(s): ANDREW A. BOCHMAN, SARAH FREEMAN
Publisher: CRC PRESS (Publication Year:2021)
Subject(s): AUTOMATION, COMPUTER CRIMES, COMPUTER SECURITY
Call No: 005.8 BOC
Accession No: 102625