Your search returned 15 results.

Sort
Results
1.
Managing the human factor in information security : how to win over staff and influence business managers David Lacey by
Publication details: Hoboken, NJ Wiley 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 LAC.

2.
Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] by
Publication details: Amsterdam Elsevier c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DUN.

3.
Policing the Internet Peggy Daniels, book editor by
Publication details: Detroit, MI Greenhaven Press c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 354.75 DAN.

4.
Collaborative computer security and trust management [edited by] Jean-Marc Seigneur, Adam Slagell by
Publication details: Hershey, PA Information Science Reference c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SEI.

5.
Cyber fraud : tactics, techniques, and procedures editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan ... [et al.] by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.163 GRA.

6.
Cybercrime : law enforcement, security and surveillance in the information age edited by Douglas Thomas and Brian D. Loader by
Publication details: New York Routledge 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 THO.

7.
Electronic crime Peter Grabosky by
Publication details: Upper Saddle River, NJ Pearson Prentice Hall 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 GRA.

8.
Hacked, attacked & abused : digital crime exposed Peter Lilley by
Publication details: London Kogan Page 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 LIL.

9.
Handbook of research on computational forensics, digital crime, and investigation : methods and solutions [edited by] Chang-Tsun Li by
Publication details: Hershey, PA Information Science Reference c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.250285 LI.

10.
Handbook of research on information security and assurance Jatinder N.D. Gupta, Sushil K. Sharma [editors] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GUP.

11.
Handbook of research on social and organizational liabilities in information security [edited by] Manish Gupta, Raj Sharman by
Publication details: Hershey, PA Information Science Reference 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GUP.

12.
High-tech crimes revealed : cyberwar stories from the digital front Steven Branigan ; [foreword by William Cheswick] by
Publication details: Boston, MA Addison-Wesley 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 BRA.

13.
Information risk and security : preventing and investigating workplace computer crime Edward Wilding by
Publication details: Aldershot, England ; Burlington, VT Gower 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 WIL.

14.
Internet denial of service : attack and defense mechanisms Jelena Mirkovic ... [et al.] by
Publication details: Upper Saddle River, NJ Prentice Hall Professional Technical Reference c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIR.

15.
IT security metrics : a practical framework for measuring security & protecting data Lance Hayden by
Publication details: New York McGraw Hill c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAY.

Pages

Find us on the map

Powered by Koha