1 2 3 4 5 Next >>
1. The international handbook of computer security /   Publication: Chicago : Glenlake Publishing Company Ltd., 2000 . xii, 260 p. : Date:2000 Availability: Copies available: Tain Campus [QA76.9 A25 S55 ] (1), Actions: Add to cart
2. Hacking exposed :   Publication: New ?York : McGraw-Hill, 2005 . xxiii, 692 p. : Date:2005 Availability: Copies available: Turkeyen Campus Reserved Collection [TK5105.59 M33 2005] (1), Turkeyen Campus Science & Technology [TK5105.59 M33 2005] (2), Actions: Add to cart
3. Digital preservation /   Publication: London : Facet Pub., 2006 . xxiii, 260 p. : Date:2006 Availability: Copies available: Turkeyen Campus Reserved Collection [TK7895 M4 D5] (1), Actions: Add to cart
4. Computer Law /   Publication: London : Blackstone Press Ltd., 1990 . xxvii, 279 p. Date:1990 Availability: Copies available: Turkeyen Campus Law Reserve Collection [KN276 C6 C66] (1), Actions: Add to cart
5. End user information security policy template by Beachy, Rob. Publication: [S.l.] : BrainMass Inc., 2012 . 1 online resource. , Title from PDF title page (viewed on Mar. 14, 2013). Date:2012 Availability: No items available: Actions: Add to cart
6. The no-nonsense guide to legal issues in Web 2.0 and cloud computing by Oppenheim, Charles. Publication: London : Facet, 2012 . 1 online resource (x, 134 p.) Date:2012 Availability: No items available: Actions: Add to cart
7. Cloud Computing by Carstensen, Jared. Publication: Ely : IT Governance Publishing, 2012 . 1 online resource (297 pages) , Intrusion detection system/intrusion prevention system. Date:2012 Availability: No items available: Actions: Add to cart
8. Use of risk analysis in computer-aided persuasion   Publication: Amsterdam ; | Washington, D.C. : IOS Press, 2011 . 1 online resource (viii, 337 p.) , "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--T.p. verso. | International conference proceedings. | Includes indexes. Date:2011 Availability: No items available: Actions: Add to cart
9. Data breaches   Publication: Ely, U.K. : IT Governance Pub., 2008 . 1 online resource (120 p.) : , Title from home page (viewed Jan. 4, 2011). Date:2008 Availability: No items available: Actions: Add to cart
10. Lessons from the identity trail   Publication: Oxford ; | New York : Oxford University Press, 2009 . 1 online resource (xxxi, 554 p.) : Date:2009 Availability: No items available: Actions: Add to cart
11. Electronic breadcrumbs   Publication: New York, N.Y. : Nova Science Publishers, 2010 . 1 online resource ([vii], 219 p.) : Date:2010 Availability: No items available: Actions: Add to cart
12. Online privacy by Gellman, Robert. Publication: Santa Barbara, Calif. : ABC-CLIO, 2011 . 1 online resource (xiv, 295 p.) Date:2011 Availability: No items available: Actions: Add to cart
13. Visions of privacy   Publication: Toronto, Ont. : University of Toronto Press, 1999 . 1 online resource (viii, 288 p.) , Selected papers from the Visions of privacy conference, held at the University of Victoria, May 9-11, 1996. Date:1999 Availability: No items available: Actions: Add to cart
14. Sanktionsdefizite im Datenschutzrecht by Lindhorst, Matthias. Publication: Frankfurt, M. ; | New York, NY : P. Lang, 2009 . 1 online resource (155 p.) , Originally presented as the author's thesis (doctoral)--Univ. Bremen, 2009. Date:2009 Availability: No items available: Actions: Add to cart
15. Ein "modernes" europ�aisches Datenschutzrecht by Comans, Clemens David, Publication: Frankfurt am Main ; | New York : Peter Lang, 2012 . 1 online resource. , Originally presented as the author's thesis (doctoral)--Univ. K�oln, 2011. Date:2012 Availability: No items available: Actions: Add to cart
16. Der Schutz elektronischer Daten im Verfassungsrecht by Aernecke, Eva. Publication: Frankfurt am Main : Peter Lang, 2012 . 1 online resource (xv, 215 p.) Date:2012 Availability: No items available: Actions: Add to cart
17. Die �Ubermittlung personenbezogener Daten in Drittstaaten nach dem BDSG by Kahl, Maria. Publication: Frankfurt am Main : Peter Lang, 2009 . 1 online resource (123 p.) Date:2009 Availability: No items available: Actions: Add to cart
18. Protecting your health privacy by Klosek, Jacqueline, Publication: Santa Barbara, Calif. : Praeger, 2011 . 1 online resource (xxv, 244 p.) Date:2011 Availability: No items available: Actions: Add to cart
19. Enterprise security for the executive by Bayuk, Jennifer L. Publication: Santa Barbara, Calif. : Praeger, 2010 . 1 online resource (ix, 163 p.) : Date:2010 Availability: No items available: Actions: Add to cart
20. The business privacy law handbook by Kennedy, Charles H. Publication: Boston : Artech House, 2008 . 1 online resource (xxvii, 312 p.) Date:2008 Availability: No items available: Actions: Add to cart No cover image available No cover image available
1 2 3 4 5 Next >>