|
|
61. |
|
Managing statistical confidentiality & microdata access
Publication:
New York : United Nations, 2007
. 1 online resource (v, 102 p.) :
, "Sales no.: E.07. II. E.7"--T.p. verso. | "ECE/CES/STAT/2007/3"--P. [4] of cover.
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
62. |
|
Simple computer security
by Geier, Eric,
Publication:
Indianapolis, IN : Wiley Pub., 2007
. 1 online resource (1 v.)
, Includes index.
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
63. |
|
Implementing database security and auditing
by Ben-Natan, Ron.
Publication:
Burlington, MA : Elsevier Digital Press, 2005
. 1 online resource (xvii, 413 p.) :
, Includes index.
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
64. |
|
Insider threat
by Cole, Eric.
Publication:
Rockland, Mass. : | Oxford : Syngress ; | Elsevier Science [distributor], 2006
. 1 online resource (1 v.) :
, Includes index.
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
65. |
|
Privacy protection and computer forensics
by Caloyannides, Michael A.
Publication:
Boston : Artech House, 2004
. 1 online resource (xix, 345 p.) :
, Rev. ed. of: Computer forensics and privacy. 2001.
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
66. |
|
Intelligent watermarking techniques
Publication:
River Edge, N.J. : World Scientific, 2004
. 1 online resource (1 v. (various pagings)) :
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
67. |
|
Data privacy in the information age
by Klosek, Jacqueline,
Publication:
Westport, Conn. : Quorum Books, 2000
. 1 online resource (ix, 262 p.)
Date:2000
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
68. |
|
What every librarian should know about electronic privacy
by Woodward, Jeannette A.
Publication:
Westport, Conn. : Libraries Unlimited, 2007
. 1 online resource (xv, 222 p.)
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
69. |
|
Data protection law for employers
by Singleton, Susan.
Publication:
London : Thorogood, 2003
. 1 online resource.
, Title from e-book title screen (viewed Aug. 25, 2005).
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
70. |
|
The disaster recovery handbook
by Wallace, Michael,
Publication:
New York : American Management Association, 2004
. 1 online resource (xvii, 398 p. :
, Title from e-book title screen (viewed Sept. 19, 2008).
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
71. |
|
Information hiding techniques for steganography and digital watermarking
Publication:
Boston : Artech House, 2000
. 1 online resource (xviii, 220 pages) :
, "Artech House computing library."
Date:2000
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
72. |
|
The visible employee
by Stanton, Jeffrey M.,
Publication:
Medford, N.J. : Information Today, 2006
. 1 online resource (xvi, 353 p.) :
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
73. |
|
Information assurance and computer security
Publication:
Amsterdam ; | Washington, DC : IOS Press, 2006
. 1 online resource (viii, 205 p.) :
, "Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--T.p. verso.
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
74. |
|
Digital data integrity
by Little, David B.
Publication:
Chichester : John Wiley & Sons, 2007
. 1 online resource (xvi, 240 p.) :
, Includes index.
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
75. |
|
Engaging privacy and information technology in a digital age
Publication:
Washington, D.C. : National Academies Press, 2007
. 1 online resource (xix, 430 p.)
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
76. |
|
The digital person
by Solove, Daniel J.,
Publication:
New York : New York University Press, 2004
. 1 online resource (xii, 283 p.)
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
77. |
|
Techniques and applications of digital watermarking and content protection
by Arnold, Michael
Publication:
Boston : Artech House, 2003
. 1 online resource (xv, 274 p.) :
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
78. |
|
Privacy in the information age
by Cate, Fred H.
Publication:
Washington, D.C. : Brookings Institution Press, 1997
. 1 online resource (xii, 248 pages)
Date:1997
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
79. |
|
The economic costs and implications of high-technology hardware theft
by Dertouzos, James N.,
Publication:
Santa Monica, CA : Rand, 1999
. 1 online resource (xxi, 63 pages) :
, "Prepared for the International Electronics Security Group and the American Electronics Association." | "Science and Techology [sic] Program."
Date:1999
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
80. |
|
Technology and privacy
Publication:
Cambridge, Mass. : MIT Press, 1997
. 1 online resource (vi, 325 pages) :
Date:1997
Availability:
No items available:
Actions:
Add to cart (remove)
|
|