Your search returned 126 results.

Sort
Results
1.
Image from Google Jackets
Managing catastrophic loss of sensitive data by Constantine Photopoulos by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 PHO.

2.
Image from Google Jackets
Managing cybersecurity resources : a cost-benefit analysis by Lawrence A. Gordon and Martin P. Loeb by
Publication details: New York McGraw-Hill c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GOR.

3.
Image from Google Jackets
Managing information assurance in financial services H. R. Rao, Manish Gupta, Shambhu J. Upadhyaya, [editors] by
Publication details: Hershey, PA IGI Pub 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 332.10684 RAO.

4.
Image from Google Jackets
Managing legal and security risks in computing and communications Paul D. Shaw by
Publication details: London ; New York Butterworth-Heinemann 1998
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.730999 SHA.

5.
Image from Google Jackets
Mastering system center data protection manager 2007 Devin L. Ganger, Ryan Femling by
Publication details: Indianapolis, IN Wiley Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 GAN.

6.
Image from Google Jackets
7.
Image from Google Jackets
Multimedia content encryption : techniques and applications Shiguo Lian by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 LIA.

8.
Image from Google Jackets
Multimedia forensics and security Chang-Tsun Li [editor] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LI.

9.
Image from Google Jackets
Negotiating privacy : the European union, the United States, and personal data protection Dorothee Heisenberg by
Publication details: Boulder, Colo Lynne Rienner Publishers 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.240858 HEI.

10.
Image from Google Jackets
Netcat power tools Jan Kanclirz Jr., technical editor; Brian Baskin, ... [et al] by
Publication details: Burlington, MA Syngress Publishing, Inc c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAN.

11.
Image from Google Jackets
Patriotic information systems Todd Loendorf & G. David Garson, editors by
Publication details: Hershey IGI Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 LOE.

12.
Image from Google Jackets
Privacy and human rights : an international and comparative study, with special reference to developments in information technology James Michael by
Publication details: Paris, France ; Aldershot, Hampshire, England Dartmouth Pub. Co., UNESCO c1994
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 MIC.

13.
Image from Google Jackets
Privacy protection for e-services [edited by] George Yee by
Publication details: Hershey, PA Idea Group Pub c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 YEE.

14.
Image from Google Jackets
Privacy, information, and technology Daniel J. Solove, Paul M. Schwartz by
Edition: 2nd ed
Publication details: New York Aspen Publishers c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 SOL.

15.
Image from Google Jackets
Protecting business information : a manager's guide James A. Schweitzer by
Publication details: Boston, MA Butterworth-Heinemann 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 SCH.

16.
Image from Google Jackets
The governance of privacy : policy instruments in global perspective Colin J. Bennett and Charles D. Raab by
Edition: [2nd and updated ed.]
Publication details: Cambridge, MA MIT Press c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 323.448309177 BEN.

17.
Image from Google Jackets
The information systems security officer's guide : establishing and managing an information protection program Gerald L. Kovacich by
Edition: 2nd ed
Publication details: Amsterdam ; Boston Butterworth-Heinemann c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KOV.

18.
Image from Google Jackets
The shellcoder's handbook : discovering and exploiting security holes Chris Anley ... [et al.] by
Edition: 2nd ed
Publication details: Indianapolis, IN Wiley Technology Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ANL.

19.
Image from Google Jackets
Tolley's data protection handbook Susan Singleton by
Edition: 4th ed
Publication details: London LexisNexis, Tolley 2006
Availability: Not available: Anna Centenary Library: Checked out (1).

20.
Image from Google Jackets
21.
Image from Google Jackets
Virtual shadows : your privacy in the information society Karen Lawrence Öqvist by
Publication details: Swindon, UK BCS 2009
Availability: Items available for loan: Anna Centenary Library (3)Call number: 303.4833 OQV, ...

22.
Image from Google Jackets
World beyond digital Rights Management Jude C. Umeh by
Publication details: Swindon, UK BCS 1988
Availability: Items available for loan: Anna Centenary Library (1)Call number: 346.0482 UME.

23.
Image from Google Jackets
Borders in cyberspace : information policy and the global information infrastructure edited by Brian Kahin and Charles Nesson by
Edition: 1st ed
Publication details: Cambridge, MA MIT Press c1997
Availability: Items available for loan: Anna Centenary Library (1)Call number: 0204 KAH.

24.
Image from Google Jackets
Building a global information assurance program Raymond J. Curts, Douglas E. Campbell by
Publication details: Boca Raton, FL Auerbach Publications c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CUR.

25.
Image from Google Jackets
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives Ron Collette, Mike Gentile, Skye Gentile by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 COL.

26.
Image from Google Jackets
Collaborative computer security and trust management [edited by] Jean-Marc Seigneur, Adam Slagell by
Publication details: Hershey, PA Information Science Reference c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SEI.

27.
Image from Google Jackets
CompTIA security+ 2008 in depth Mark Ciampa by
Publication details: Australia Course Technology c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CIA.

28.
Image from Google Jackets
Computer security : 20 things every employee should know Ben Rothke by
Edition: 2nd ed
Publication details: New York McGraw-Hill c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

29.
Image from Google Jackets
Computer security lab manual Vincent J. Nestler ... [et al.] by
Publication details: Boston ; McGraw-Hill Irwin, c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NES.

30.
Image from Google Jackets
Concise European IT law edited by Alfred Büllesbach, Yves Poullet, Corien Prins by
Publication details: Alphen aan den Rijn ; Frederick, MD Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Pubishrs c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.240999 BUL.

31.
Image from Google Jackets
Copyright and electronic commerce : legal aspects of electronic copyright management editor, P. Bernt Hugenholtz ; contributors Kamiel J. Koelman ... [et al.] by
Publication details: The Hague ; Boston Kluwer Law 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 346.0482 HUG.

32.
Image from Google Jackets
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses Ed Skoudis with Tom Liston by
Edition: 2nd ed
Publication details: Upper Saddle River, N.J Prentice Hall Professional Technical Reference c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SKO.

33.
Image from Google Jackets
Critical infrastructures : state of the art in research and application edited by W.A.H. Thissen and P.M. Herder by
Publication details: Dordrecht ; Boston Kluwer Academic Publishers c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363 THI.

34.
Image from Google Jackets
Cyber law in Australia Eugene Clark ... [et al.] by
Publication details: The Hague ; Frederick, MD Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.940999 CLA.

35.
Image from Google Jackets
Cyber-security and global information assurance : threat analysis and response solutions Kenneth J. Knapp, editor by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KNA.

36.
Image from Google Jackets
Data leaks for dummies(r) Guy Bunker, Gareth Fraser-King by
Edition: 1st ed
Publication details: Hoboken, NJ Wiley Pub 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BUN.

37.
Image from Google Jackets
Data privacy and security David Salomon by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SAL.

38.
Image from Google Jackets
Data protection : a practical guide to UK and EU law Peter Carey by
Edition: 3rd ed
Publication details: Oxford Oxford University Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.240858 CAR.

39.
Image from Google Jackets
Data protection : governance, risk management, and compliance David G. Hill by
Publication details: Baca Raton, FL Taylor & Francis 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.86 HIL.

40.
Image from Google Jackets
Data protection and compliance in context Stewart Room by
Publication details: Swindon, U.K British Computer Society (BCS) c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.410858 ROO.

41.
Image from Google Jackets
Data protection and information lifecycle management Tom Petrocelli by
Publication details: Upper Saddle River, NJ Prentice Hall Professional Technical Reference c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PET.

42.
Image from Google Jackets
Data protection law : approaching its rationale, logic, and limits by Lee A. Bygrave by
Publication details: Alphen aan den Rijn, The Netherlands ; Frederick, MD Kluwer Law International 2002
Availability: Not available: Anna Centenary Library: Checked out (1).

43.
Image from Google Jackets
Data protection law and practice Rosemary Jay by
Publication details: London Sweet & Maxwell ©2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.410858 ROS.

44.
Image from Google Jackets
Dictionary of information security Robert Slade by
Publication details: Rockland, MA Syngress Publishing 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SLA.

45.
Image from Google Jackets
Digital anonymity and the law : tensions and dimensions edited by C. Nicoll, J.E.J. Prins, M.J.M. van Dellen by
Publication details: The Hague T.M.C. Asser Press c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 NIC.

46.
Image from Google Jackets
Digital defense : what you should know about protecting your company's assets Thomas J. Parenty by
Publication details: Boston Harvard Business School 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 PAR.

47.
Image from Google Jackets
Digital rights management Joan Van Tassel by
Publication details: Amsterdam ; Boston Focal 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TAS.

48.
Image from Google Jackets
Digital rights management : technological, economic, legal and political aspects Eberhard Becker ... [et al.] by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEC.

49.
Image from Google Jackets
Digital rights management for e-commerce systems Dimitrios Tsolis ... [et al.] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TSO.

50.
Image from Google Jackets
Digital watermarking and steganography Ingemar J. Cox ... [et al.] by
Edition: 2nd ed
Publication details: Amsterdam ; Boston Morgan Kaufmann Publishers c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COX.

51.
Image from Google Jackets
Disaster recovery : principles and practices April J. Wells, Charlyne Walker and Timothy Walker by
Publication details: Upper Saddle River, N.J Pearson Prentice Hall 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.348 WEL.

52.
Image from Google Jackets
Disaster recovery planning : preparing for the unthinkable Jon William Toigo ; with illustrations by Margaret Romao Toigo by
Edition: 3rd ed
Publication details: Upper Saddle River, NJ Prentice Hall 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 TOI.

53.
Image from Google Jackets
European data protection law : corporate compliance and regulation Christopher Kuner by
Edition: 2nd ed
Publication details: Oxford Oxford University Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.240858 KUN.

54.
Image from Google Jackets
Financial crime in the EU : criminal records as effective tools or missed opportunities edited by Constantin Stefanou and Helen Xanthaki by
Publication details: Alphen aan den Rijn, The Netherlands ; Frederick, MD Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.4077 STE.

55.
Image from Google Jackets
Global perspectives in information security : legal, social and international issues edited by Hossein Bidgoli by
Publication details: Hoboken, NJ J. Wiley & Sons 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.7309944 BID.

56.
Image from Google Jackets
Global privacy and security law Francoise Gilbert by
Publication details: Austin Wolters Kluwer Law & Business ; Frederick, MD ; Aspen Publishers ©2009-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.05246 GIL.1.

57.
Image from Google Jackets
Global privacy protection : the first generation edited by James B. Rule and Graham Greenleaf by
Publication details: Cheltenham, UK ; North Hampton, MA, USA E. Elgar c2008
Availability: Not available: Anna Centenary Library: Checked out (1).

58.
Image from Google Jackets
Hacking exposed 6 : network security secrets & solutions Stuart McClure, Joel Scambray, George Kurtz by
Edition: 10th anniversary ed
Publication details: New York McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 MCC, ...

59.
Image from Google Jackets
Hacking exposed Cisco networks : Cisco security secrets & solutions Andrew A. Vladimirov ... [et al.] by
Publication details: New York McGraw-Hill/Osborne c2006
Availability: Items available for loan: Anna Centenary Library (2)Call number: TK5105.59 .H32 2006, ...

60.
Image from Google Jackets
Handbook of information security management Micki Krause, Harold F. Tipton, editors by
Publication details: Boca Raton, FL Auerbach c1998
Availability: No items available.

61.
Image from Google Jackets
Handbook of research on secure multimedia distribution [edited by] Shiguo Lian, Yan Zhang by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LIA.

62.
Image from Google Jackets
Handbook of research on social and organizational liabilities in information security [edited by] Manish Gupta, Raj Sharman by
Publication details: Hershey, PA Information Science Reference 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GUP.

63.
Image from Google Jackets
How to secure and audit Oracle 10g and 11g Ron Ben Natan ; foreword by Pete Finnigan by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

64.
Image from Google Jackets
Human rights in the digital age edited by Mathias Klang and Andrew Murray by
Publication details: London ; Portland, Or GlassHouse 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.41085 KLA.

65.
Image from Google Jackets
Implementation of the data protection Directive in relation to medical research in Europe edited by D. Beyleveld ... [et al.] by
Publication details: Aldershot, Hants, England ; Burlington, VT Ashgate c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.40858 BEY.

66.
Image from Google Jackets
Information assurance : managing organizational IT security risks Joseph G. Boyce, Dan W. Jennings by
Publication details: Oxford, UK ; Burlington, MA Butterworth-Heinemann c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BOY.

67.
Image from Google Jackets
Information assurance architecture Keith D. WIllett by
Publication details: Boca Raton, FL CRC Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WIL.

68.
Image from Google Jackets
Information law towards the 21st century editors, Willem F. Korthals Altes ... [et at.] by
Publication details: Dordrecht ; Boston Kluwer Law and Taxation Publishers 1992
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0662 KOR.

69.
Image from Google Jackets
Information privacy : statutes and regulations Paul M. Schwartz, Daniel J. Solove by
Publication details: Austin ; Frederick, MD Aspen Publishers, Wolters Kluwer Law & Business c2008-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342 SCH.

70.
Image from Google Jackets
Information privacy law Daniel J. Solove, Paul M. Schwartz by
Edition: 3rd ed
Publication details: Austin Aspen Publishers, Wolters Kluwer Law & Business c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 SOL.

71.
Image from Google Jackets
Information security : protecting the global enterprise Donald L. Pipkin by
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PIP.

72.
Image from Google Jackets
73.
Image from Google Jackets
Information security management : concepts and practice Bel G. Raggad by
Publication details: Boca Raton, FL CRC Press/Taylor & Francis c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RAG.

74.
Image from Google Jackets
Information security management metrics : a definitive guide to effective security monitoring and measurement W. Krag Brotby by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 BRO.

75.
Image from Google Jackets
Information security policies and procedures : a practitioner's reference Thomas R. Peltier by
Edition: 2nd ed
Publication details: Boca Raton, FL Auerbach Publications c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PEL.

76.
Image from Google Jackets
Information Technology and the law H. Franken and Maria Samuel by
Publication details: New Delhi Commonwealth 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004 SAM.

77.
Image from Google Jackets
Information Technology law : the law and society Andrew Murray by
Publication details: Oxford Oxford University Press 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.4109944 MUR.

78.
Image from Google Jackets
Information Technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams Jake Kouns, Daniel Minoli by
Publication details: Hoboken, NJ Wiley 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 KOU.

79.
Image from Google Jackets
Information warfare Daniel Ventre by
Publication details: London, UK ; Hoboken, NJ ISTE Ltd. ; John Wiley & Sons c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 355.343 VEN.

80.
Image from Google Jackets
Infosecurity 2008 threat analysis [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

81.
Image from Google Jackets
International IT governance : an executive guide to ISO 17799/ISO 27001 Alan Calder & Steve Watkins by
Publication details: Delhi Kogan Page Limited 2006
Availability: Items available for loan: Anna Centenary Library (3)Call number: 005.8 CAL, ...

82.
Image from Google Jackets
IT governance : a manager's guide to data security and BS 7799/ISO 17799 Alan Calder, Steve Watkins by
Edition: 3rd ed
Publication details: London ; Sterling, VA Kogan Page 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

83.
Image from Google Jackets
IT governance : a manager's guide to data security and ISO 27001/ISO 27002 Alan Calder & Steve Watkins by
Edition: 4th ed
Publication details: Delhi Kogan Page Limited 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

84.
Image from Google Jackets
IT security metrics : a practical framework for measuring security & protecting data Lance Hayden by
Publication details: New York McGraw Hill c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAY.

85.
Image from Google Jackets
Law on the electronic frontier Ian J. Lloyd and Moira Simpson by
Publication details: Edinburgh Edinburgh University Press 1994
Availability: Items available for loan: Anna Centenary Library (1)Call number: 344.103999 LLO.

86.
Image from Google Jackets
Law, information and information technology edited by Eli Lederman, Ron Shapira by
Publication details: Alphen aan den Rijn, The Netherlands ; Frederick, MD Kluwer Law International c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.09944 LED.

87.
Image from Google Jackets
Lessons from the identity trail : anonymity, privacy, and identity in a networked society edited by Ian Kerr, Valerie Steeves, and Carole Lucock by
Publication details: Oxford Oxford University Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 KER.

88.
Image from Google Jackets
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors Ron Ben Natan by
Publication details: Burlington, MA Elsevier Digital Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

89.
Image from Google Jackets
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors Ron Ben Natan by
Publication details: Burlington, MA Elsevier Digital Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

90.
Image from Google Jackets
Information assurance for the enterprise : a roadmap to information security Corey Schou, Dan Shoemaker by
Publication details: Boston McGraw-Hill Irwin c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

91.
Image from Google Jackets
Information assurance for the enterprise : a roadmap to information security Corey Schou, Dan Shoemaker by
Publication details: Boston McGraw-Hill Irwin c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: QA76.9.A25 S3523 2007 005.8.

92.
Image from Google Jackets
Information security management handbook Harold F. Tipton, Micki Krause, [editors] by
Edition: 6th ed
Publication details: Boca Raton, FL Auerbach Publications c2007-2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TIP.

93.
Image from Google Jackets
Information security management handbook Harold F Tipton, Micki Krause by
Edition: 6th ed
Publication details: Boca Raton, FL Auerbach Publications 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 TIP.

94.
Image from Google Jackets
Information Technology law Ian J. Lloyd by
Edition: 4th ed
Publication details: Oxford Oxford University Press [2004]
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.410999 LLO.

95.
Image from Google Jackets
Information Technology law Ian J. Lloyd by
Edition: 5th ed
Publication details: Oxford Oxford University Press 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.3554 LLO.

96.
Image from Google Jackets
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: QA76. 9. D348 O73 2009 005. 8/6, ...

97.
Image from Google Jackets
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005. 7575 CAR.

98.
Image from Google Jackets
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Nodia Pearson 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PFL.

99.
Image from Google Jackets
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PFL.

100.
Image from Google Jackets
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: QA76.9.A25 P45 2007 005.8.

101.
Image from Google Jackets
The world beyond digital rights management Jude C. Umeh by
Publication details: Swindon, UK BCS 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 346.0482 UME, ...

102.
Image from Google Jackets
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law Alan Calder by
Publication details: London Kogan Page c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

103.
Image from Google Jackets
104.
Image from Google Jackets
A practical guide to security engineering and information assurance Debra S. Herrmann by
Publication details: Boca Raton, FL CRC Press c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HER.

105.
Image from Google Jackets
106.
Image from Google Jackets
Advances in enterprise information technology security Djamel Khadraoui and Francine Herrmann, editors by
Publication details: Hershey, PA Information Science Reference c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KHA.

107.
Image from Google Jackets
Analyzing computer security : a threat/vulnerability/countermeasure approach Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: Indian edition
Publication details: New Delhi 2014
Availability: Items available for loan: Anna Centenary Library (4).

108.
Image from Google Jackets
Anti-hacker tool kit Mike Shema ... [et al.] by
Edition: 3rd ed
Publication details: New York McGraw-Hill/Osborne c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHE.

109.
Image from Google Jackets
Backup and recovery W. Curtis Preston by
Publication details: Beijing O'Reilly c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.86 PRE.

110.
Image from Google Jackets
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: No items available.

111.
Image from Google Jackets
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: No items available.

112.
Image from Google Jackets
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Nodia Pearson 2009
Availability: No items available.

113.
Image from Google Jackets
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: No items available.

114.
Image from Google Jackets
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: No items available.

115.
Image from Google Jackets
The world beyond digital rights management Jude C. Umeh by
Publication details: Swindon, UK BCS 2009
Availability: No items available.

116.
Image from Google Jackets
The world beyond digital rights management Jude C. Umeh by
Publication details: Swindon, UK BCS 2009
Availability: No items available.

117.
Image from Google Jackets
Data governance the definitive guide / Eryurek people, processes, and tools to operationalize data trustworthiness by
Edition: 1st ed.
Language: English
Publication details: Sebastopol, CA : O'Reilly Media c2021
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 ERY;1. Not available: Anna Centenary Library: Checked out (1).

118.
Image from Google Jackets
97 Things Every Information Security Professional Should Know Collective Wisdom From The Experts /Christina Morillo by
Edition: 1st edition
Language: English
Publication details: , Sebastopol, California, O'Reilly Media, Inc. 2021
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 MOR, ...

119.
Image from Google Jackets
Modern Data Protection Ensuring Recoverability Of All Modern Workloads / Preston by Language: English
Publication details: Mumbai Shroff Publishers 2024
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 PRE, ...

120.
Image from Google Jackets
Serverless security /Miguel A. Calles : understand, assess, and implement secure and reliable applications in AWS, microsoft azure, and google cloud by Language: English
Publication details: New York : Apress c2020
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 CAL;1. Not available: Anna Centenary Library: Checked out (1).

121.
Image from Google Jackets
Security Policies And Implementation Issues Rob Johnson by Language: English
Publication details: Sudbury, Mass., Jones & Bartlett Learning ,©2011
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005 JOH.

122.
Image from Google Jackets
Software Testing And Continuous Quality Improvement, 3rd Edition /William Lewis by
Edition: 3rd ed
Language: English
Publication details: Auerbach Publications, 2017
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.4 LEW.

123.
Image from Google Jackets
Security Education And Critical Infrastructures / Cynthia Irvine, Helen Armstrong by Language: English
Publication details: Kluwer Academic, Boston, Mass., 2003
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 IRV.

124.
Image from Google Jackets
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece / edited by Dimitris Gritzalis ... [et al.]. by Series: Language: English
Publication details: Boston : Kluwer Academic Publishers, c2003
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 GRI.

125.
Image from Google Jackets
Research Directions In Data And Applications Security : ifip tc11/wg11.3 sixteenth annual conference on data and applications security, july 28-31, 2002, cambridge, uk edited by Ehud Gudes and Sujeet Shenoi by Language: English
Publication details: London Kluwer Academic Publishers 2003
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 GUD.

126.
Image from Google Jackets
Security And Watermarking Of Multimedia Contents Iv : 21-24 january, 2002, san jose, [california] usa / Edward J. Delp, Ping Wah Wong by Series: Proceedings of SPIE--the International Society for Optical Engineering ; v. 4675Language: English
Publication details: Bellingham, Wash., Spie ©2002
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 DEL.

Find us on the map