61. Managing statistical confidentiality & microdata access   Publication: New York : United Nations, 2007 . 1 online resource (v, 102 p.) : , "Sales no.: E.07. II. E.7"--T.p. verso. | "ECE/CES/STAT/2007/3"--P. [4] of cover. Date:2007 Availability: No items available: Actions: Add to cart
62. Simple computer security by Geier, Eric, Publication: Indianapolis, IN : Wiley Pub., 2007 . 1 online resource (1 v.) , Includes index. Date:2007 Availability: No items available: Actions: Add to cart
63. Implementing database security and auditing by Ben-Natan, Ron. Publication: Burlington, MA : Elsevier Digital Press, 2005 . 1 online resource (xvii, 413 p.) : , Includes index. Date:2005 Availability: No items available: Actions: Add to cart
64. Insider threat by Cole, Eric. Publication: Rockland, Mass. : | Oxford : Syngress ; | Elsevier Science [distributor], 2006 . 1 online resource (1 v.) : , Includes index. Date:2006 Availability: No items available: Actions: Add to cart
65. Privacy protection and computer forensics by Caloyannides, Michael A. Publication: Boston : Artech House, 2004 . 1 online resource (xix, 345 p.) : , Rev. ed. of: Computer forensics and privacy. 2001. Date:2004 Availability: No items available: Actions: Add to cart
66. Intelligent watermarking techniques   Publication: River Edge, N.J. : World Scientific, 2004 . 1 online resource (1 v. (various pagings)) : Date:2004 Availability: No items available: Actions: Add to cart
67. Data privacy in the information age by Klosek, Jacqueline, Publication: Westport, Conn. : Quorum Books, 2000 . 1 online resource (ix, 262 p.) Date:2000 Availability: No items available: Actions: Add to cart
68. What every librarian should know about electronic privacy by Woodward, Jeannette A. Publication: Westport, Conn. : Libraries Unlimited, 2007 . 1 online resource (xv, 222 p.) Date:2007 Availability: No items available: Actions: Add to cart
69. Data protection law for employers by Singleton, Susan. Publication: London : Thorogood, 2003 . 1 online resource. , Title from e-book title screen (viewed Aug. 25, 2005). Date:2003 Availability: No items available: Actions: Add to cart
70. The disaster recovery handbook by Wallace, Michael, Publication: New York : American Management Association, 2004 . 1 online resource (xvii, 398 p. : , Title from e-book title screen (viewed Sept. 19, 2008). Date:2004 Availability: No items available: Actions: Add to cart
71. Information hiding techniques for steganography and digital watermarking   Publication: Boston : Artech House, 2000 . 1 online resource (xviii, 220 pages) : , "Artech House computing library." Date:2000 Availability: No items available: Actions: Add to cart
72. The visible employee by Stanton, Jeffrey M., Publication: Medford, N.J. : Information Today, 2006 . 1 online resource (xvi, 353 p.) : Date:2006 Availability: No items available: Actions: Add to cart
73. Information assurance and computer security   Publication: Amsterdam ; | Washington, DC : IOS Press, 2006 . 1 online resource (viii, 205 p.) : , "Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--T.p. verso. Date:2006 Availability: No items available: Actions: Add to cart
74. Digital data integrity by Little, David B. Publication: Chichester : John Wiley & Sons, 2007 . 1 online resource (xvi, 240 p.) : , Includes index. Date:2007 Availability: No items available: Actions: Add to cart
75. Engaging privacy and information technology in a digital age   Publication: Washington, D.C. : National Academies Press, 2007 . 1 online resource (xix, 430 p.) Date:2007 Availability: No items available: Actions: Add to cart
76. The digital person by Solove, Daniel J., Publication: New York : New York University Press, 2004 . 1 online resource (xii, 283 p.) Date:2004 Availability: No items available: Actions: Add to cart
77. Techniques and applications of digital watermarking and content protection by Arnold, Michael Publication: Boston : Artech House, 2003 . 1 online resource (xv, 274 p.) : Date:2003 Availability: No items available: Actions: Add to cart
78. Privacy in the information age by Cate, Fred H. Publication: Washington, D.C. : Brookings Institution Press, 1997 . 1 online resource (xii, 248 pages) Date:1997 Availability: No items available: Actions: Add to cart
79. The economic costs and implications of high-technology hardware theft by Dertouzos, James N., Publication: Santa Monica, CA : Rand, 1999 . 1 online resource (xxi, 63 pages) : , "Prepared for the International Electronics Security Group and the American Electronics Association." | "Science and Techology [sic] Program." Date:1999 Availability: No items available: Actions: Add to cart
80. Technology and privacy   Publication: Cambridge, Mass. : MIT Press, 1997 . 1 online resource (vi, 325 pages) : Date:1997 Availability: No items available: Actions: Add to cart

Refine your search