Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"Data Protection"'
Refine your search
Availability
Limit to records with available items
Authors
Ben-Natan, Ron
Calder, Alan
Carey, Peter
Carpenter, Larry
Gupta, Manish
Krause, Micki
Lian, Shiguo
Lloyd, Ian J
Murray, Andrew
Pfleeger, Charles P
Pfleeger, Shari Lawr...
Rao, H. R
Schou, Corey
Schwartz, Paul M
Shema, Mike
Shoemaker, Dan
Solove, Daniel J
Tipton, Harold F
Umeh, Jude C
Watkins, Steve
Show more
Show less
Item types
Books
English Books
Reference
Locations
3RD FLOOR, A WING
6TH FLOOR, B WING
Series
IFIP
Proceedings of SPIE-...
Topics
Business - Data proc...
Business enterprises...
Computer networks - ...
Computer science
Computer security
Computer security - ...
Computers - Law and ...
Copyright and electr...
Data protection
Data protection - Ha...
Data protection - La...
Data protection - La...
Data protection - La...
Data protection - La...
Data recovery (Compu...
Database security
Information technolo...
Oracle (Computer fil...
Privacy, Right of
Privacy, Right of - ...
Show more
Show less
Your search returned 126 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Results
1.
Image from Google Jackets
Managing catastrophic loss of sensitive data
by Constantine Photopoulos
by
Photopoulos, Constantine
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 PHO
.
2.
Image from Google Jackets
Managing cybersecurity resources : a cost-benefit analysis
by Lawrence A. Gordon and Martin P. Loeb
by
Gordon, Lawrence A
Loeb, Martin P
Publication details:
New York
McGraw-Hill
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GOR
.
3.
Image from Google Jackets
Managing information assurance in financial services
H. R. Rao, Manish Gupta, Shambhu J. Upadhyaya, [editors]
by
Gupta, Manish
Rao, H. R
Upadhyaya, Shambhu
Publication details:
Hershey, PA
IGI Pub
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
332.10684 RAO
.
4.
Image from Google Jackets
Managing legal and security risks in computing and communications
Paul D. Shaw
by
Shaw, Paul
Publication details:
London ; New York
Butterworth-Heinemann
1998
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.730999 SHA
.
5.
Image from Google Jackets
Mastering system center data protection manager 2007
Devin L. Ganger, Ryan Femling
by
Ganger, Devin L
Femling, Ryan
Publication details:
Indianapolis, IN
Wiley Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6 GAN
.
6.
Image from Google Jackets
Media forensics and security II : 18-20 January 2010, San Jose, California, United States
Nasir D. Memon ... [et al.], editors ; sponsored and published by IS & T--the Society for Imaging Science and Technology [and] SPIE ; cosponsored by Digital Watermarking Alliance
by
Memon, Nasir D
Digital Watermarking Alliance, Electronic Imaging Science and Technology Symposium (2010 : San Jose, Calif.), IS & T--the Society for Imaging Science and Technology, SPIE (Society)
Publication details:
Bellingham, WA
SPIE
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MEM
.
7.
Image from Google Jackets
Multimedia content encryption : techniques and applications
Shiguo Lian
by
Lian, Shiguo
Publication details:
Boca Raton, FL
CRC Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 LIA
.
8.
Image from Google Jackets
Multimedia forensics and security
Chang-Tsun Li [editor]
by
Li, Chang-Tsun
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LI
.
9.
Image from Google Jackets
Negotiating privacy : the European union, the United States, and personal data protection
Dorothee Heisenberg
by
Heisenberg, Dorothee
Publication details:
Boulder, Colo
Lynne Rienner Publishers
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.240858 HEI
.
10.
Image from Google Jackets
Netcat power tools
Jan Kanclirz Jr., technical editor; Brian Baskin, ... [et al]
by
Baskin, Brian
Kanclirz, Jan
Publication details:
Burlington, MA
Syngress Publishing, Inc
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAN
.
11.
Image from Google Jackets
Patriotic information systems
Todd Loendorf & G. David Garson, editors
by
Garson, G. David
Loendorf, Todd
Publication details:
Hershey
IGI Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 LOE
.
12.
Image from Google Jackets
Privacy and human rights : an international and comparative study, with special reference to developments in information technology
James Michael
by
Michael, James
Publication details:
Paris, France ; Aldershot, Hampshire, England
Dartmouth Pub. Co., UNESCO
c1994
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 MIC
.
13.
Image from Google Jackets
Privacy protection for e-services
[edited by] George Yee
by
Yee, George
Publication details:
Hershey, PA
Idea Group Pub
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 YEE
.
14.
Image from Google Jackets
Privacy, information, and technology
Daniel J. Solove, Paul M. Schwartz
by
Solove, Daniel J
Schwartz, Paul M
Edition:
2nd ed
Publication details:
New York
Aspen Publishers
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 SOL
.
15.
Image from Google Jackets
Protecting business information : a manager's guide
James A. Schweitzer
by
Schweitzer, James A
Publication details:
Boston, MA
Butterworth-Heinemann
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 SCH
.
16.
Image from Google Jackets
The governance of privacy : policy instruments in global perspective
Colin J. Bennett and Charles D. Raab
by
Bennett, Colin J
Raab, Charles D
Edition:
[2nd and updated ed.]
Publication details:
Cambridge, MA
MIT Press
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
323.448309177 BEN
.
17.
Image from Google Jackets
The information systems security officer's guide : establishing and managing an information protection program
Gerald L. Kovacich
by
Kovacich, Gerald L
Edition:
2nd ed
Publication details:
Amsterdam ; Boston
Butterworth-Heinemann
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KOV
.
18.
Image from Google Jackets
The shellcoder's handbook : discovering and exploiting security holes
Chris Anley ... [et al.]
by
Anley, Chris
Edition:
2nd ed
Publication details:
Indianapolis, IN
Wiley Technology Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ANL
.
19.
Image from Google Jackets
Tolley's data protection handbook
Susan Singleton
by
Singleton, Susan
Edition:
4th ed
Publication details:
London
LexisNexis, Tolley
2006
Availability:
Not available:
Anna Centenary Library: Checked out
(1).
20.
Image from Google Jackets
Trusted information : the new decade challenge : IFIP TC11 16th international conference on information security (IFIP/Sec'01), June 11-13, 2001, Paris, France
edited by Michel Dupuy, Pierre Paradinas
by
Dupuy, Michel
Paradinas, Pierre
IFIP TC11 International Conference on Information Security (16th : 2001 : Paris, France)
Publication details:
Dordrecht ; Boston, MA
Kluwer Academic Publishers
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DUP
.
21.
Image from Google Jackets
Virtual shadows : your privacy in the information society
Karen Lawrence Öqvist
by
Öqvist, Karen Lawrence
British Computer Society
Publication details:
Swindon, UK
BCS
2009
Availability:
Items available for loan:
Anna Centenary Library
(3)
Call number:
303.4833 OQV, ..
.
22.
Image from Google Jackets
World beyond digital Rights Management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
1988
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
346.0482 UME
.
23.
Image from Google Jackets
Borders in cyberspace : information policy and the global information infrastructure
edited by Brian Kahin and Charles Nesson
by
Kahin, Brian
Nesson, Charles R
Edition:
1st ed
Publication details:
Cambridge, MA
MIT Press
c1997
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
0204 KAH
.
24.
Image from Google Jackets
Building a global information assurance program
Raymond J. Curts, Douglas E. Campbell
by
Curts, Raymond J
Campbell, Douglas E
Publication details:
Boca Raton, FL
Auerbach Publications
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CUR
.
25.
Image from Google Jackets
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
Ron Collette, Mike Gentile, Skye Gentile
by
Collette, Ronald D
Gentile, Michael
Gentile, Skye
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 COL
.
26.
Image from Google Jackets
Collaborative computer security and trust management
[edited by] Jean-Marc Seigneur, Adam Slagell
by
Seigneur, Jean-Marc
Slagell, Adam
Publication details:
Hershey, PA
Information Science Reference
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SEI
.
27.
Image from Google Jackets
CompTIA security+ 2008 in depth
Mark Ciampa
by
Ciampa, Mark D
Publication details:
Australia
Course Technology
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CIA
.
28.
Image from Google Jackets
Computer security : 20 things every employee should know
Ben Rothke
by
Rothke, Ben
Edition:
2nd ed
Publication details:
New York
McGraw-Hill
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
29.
Image from Google Jackets
Computer security lab manual
Vincent J. Nestler ... [et al.]
by
Nestler, Vincent J
Publication details:
Boston ; McGraw-Hill Irwin, c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NES
.
30.
Image from Google Jackets
Concise European IT law
edited by Alfred Büllesbach, Yves Poullet, Corien Prins
by
Büllesbach, Alfred
Poullet, Yves
Prins, C
Publication details:
Alphen aan den Rijn ; Frederick, MD
Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Pubishrs
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.240999 BUL
.
31.
Image from Google Jackets
Copyright and electronic commerce : legal aspects of electronic copyright management
editor, P. Bernt Hugenholtz ; contributors Kamiel J. Koelman ... [et al.]
by
Hugenholtz, P. B
Koelman, Kamiel
Publication details:
The Hague ; Boston
Kluwer Law
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
346.0482 HUG
.
32.
Image from Google Jackets
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Ed Skoudis with Tom Liston
by
Skoudis, Ed
Liston, Tom
Edition:
2nd ed
Publication details:
Upper Saddle River, N.J
Prentice Hall Professional Technical Reference
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SKO
.
33.
Image from Google Jackets
Critical infrastructures : state of the art in research and application
edited by W.A.H. Thissen and P.M. Herder
by
Herder, Paulien Minke
Thissen, Wil A. H
International Conference on Technology, Policy, and Innovation (5th : 2001 : Hague, Netherlands)
Publication details:
Dordrecht ; Boston
Kluwer Academic Publishers
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363 THI
.
34.
Image from Google Jackets
Cyber law in Australia
Eugene Clark ... [et al.]
by
Clark, E. Eugene
Publication details:
The Hague ; Frederick, MD
Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.940999 CLA
.
35.
Image from Google Jackets
Cyber-security and global information assurance : threat analysis and response solutions
Kenneth J. Knapp, editor
by
Knapp, Kenneth J
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KNA
.
36.
Image from Google Jackets
Data leaks for dummies(r)
Guy Bunker, Gareth Fraser-King
by
Bunker, Guy
Edition:
1st ed
Publication details:
Hoboken, NJ
Wiley Pub
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BUN
.
37.
Image from Google Jackets
Data privacy and security
David Salomon
by
Salomon, D
Publication details:
Berlin
Springer
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SAL
.
38.
Image from Google Jackets
Data protection : a practical guide to UK and EU law
Peter Carey
by
Carey, Peter
Edition:
3rd ed
Publication details:
Oxford
Oxford University Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.240858 CAR
.
39.
Image from Google Jackets
Data protection : governance, risk management, and compliance
David G. Hill
by
Hill, David G
Publication details:
Baca Raton, FL
Taylor & Francis
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.86 HIL
.
40.
Image from Google Jackets
Data protection and compliance in context
Stewart Room
by
Room, Stewart
Publication details:
Swindon, U.K
British Computer Society (BCS)
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.410858 ROO
.
41.
Image from Google Jackets
Data protection and information lifecycle management
Tom Petrocelli
by
Petrocelli, Thomas D
Publication details:
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PET
.
42.
Image from Google Jackets
Data protection law : approaching its rationale, logic, and limits
by Lee A. Bygrave
by
Bygrave, Lee A
Publication details:
Alphen aan den Rijn, The Netherlands ; Frederick, MD
Kluwer Law International
2002
Availability:
Not available:
Anna Centenary Library: Checked out
(1).
43.
Image from Google Jackets
Data protection law and practice
Rosemary Jay
by
Jay, Rosemary
Publication details:
London
Sweet & Maxwell
©2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.410858 ROS
.
44.
Image from Google Jackets
Dictionary of information security
Robert Slade
by
Slade, Robert
Publication details:
Rockland, MA
Syngress Publishing
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SLA
.
45.
Image from Google Jackets
Digital anonymity and the law : tensions and dimensions
edited by C. Nicoll, J.E.J. Prins, M.J.M. van Dellen
by
Dellen, M J M Van
Nicoll, C
Prins, J E J
Publication details:
The Hague
T.M.C. Asser Press
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 NIC
.
46.
Image from Google Jackets
Digital defense : what you should know about protecting your company's assets
Thomas J. Parenty
by
Parenty, Thomas J
Publication details:
Boston
Harvard Business School
2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 PAR
.
47.
Image from Google Jackets
Digital rights management
Joan Van Tassel
by
Van Tassel, Joan M
Publication details:
Amsterdam ; Boston
Focal
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TAS
.
48.
Image from Google Jackets
Digital rights management : technological, economic, legal and political aspects
Eberhard Becker ... [et al.]
by
Becker, Eberhard
Publication details:
Berlin
Springer
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEC
.
49.
Image from Google Jackets
Digital rights management for e-commerce systems
Dimitrios Tsolis ... [et al.]
by
Tsolis, Dimitrios
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TSO
.
50.
Image from Google Jackets
Digital watermarking and steganography
Ingemar J. Cox ... [et al.]
by
Cox, I. J
Edition:
2nd ed
Publication details:
Amsterdam ; Boston
Morgan Kaufmann Publishers
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 COX
.
51.
Image from Google Jackets
Disaster recovery : principles and practices
April J. Wells, Charlyne Walker and Timothy Walker
by
Wells, April J
Walker, Charlyne
Walker, Timothy
Publication details:
Upper Saddle River, N.J
Pearson Prentice Hall
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.348 WEL
.
52.
Image from Google Jackets
Disaster recovery planning : preparing for the unthinkable
Jon William Toigo ; with illustrations by Margaret Romao Toigo
by
Toigo, Jon William
Edition:
3rd ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 TOI
.
53.
Image from Google Jackets
European data protection law : corporate compliance and regulation
Christopher Kuner
by
Kuner, Christopher
Edition:
2nd ed
Publication details:
Oxford
Oxford University Press
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.240858 KUN
.
54.
Image from Google Jackets
Financial crime in the EU : criminal records as effective tools or missed opportunities
edited by Constantin Stefanou and Helen Xanthaki
by
Stephanou, Constantine A
Xanthaki, Helen
Publication details:
Alphen aan den Rijn, The Netherlands ; Frederick, MD
Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.4077 STE
.
55.
Image from Google Jackets
Global perspectives in information security : legal, social and international issues
edited by Hossein Bidgoli
by
Bidgoli, Hossein
Publication details:
Hoboken, NJ
J. Wiley & Sons
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.7309944 BID
.
56.
Image from Google Jackets
Global privacy and security law
Francoise Gilbert
by
Gilbert, Francoise
American Association of Law Libraries. Annual Meeting and Conference (97th : 2004 July 10-14 : Boston, Mass.), Bureau of National Affairs (Arlington, Va.)
Publication details:
Austin
Wolters Kluwer Law & Business ; Frederick, MD ; Aspen Publishers
©2009-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.05246 GIL.1
.
57.
Image from Google Jackets
Global privacy protection : the first generation
edited by James B. Rule and Graham Greenleaf
by
Greenleaf, G. W
Rule, James B
Publication details:
Cheltenham, UK ; North Hampton, MA, USA
E. Elgar
c2008
Availability:
Not available:
Anna Centenary Library: Checked out
(1).
58.
Image from Google Jackets
Hacking exposed 6 : network security secrets & solutions
Stuart McClure, Joel Scambray, George Kurtz
by
McClure, Stuart
Kurtz, George
Scambray, Joel
Edition:
10th anniversary ed
Publication details:
New York
McGraw-Hill
c2009
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 MCC, ..
.
59.
Image from Google Jackets
Hacking exposed Cisco networks : Cisco security secrets & solutions
Andrew A. Vladimirov ... [et al.]
by
Vladimirov, Andrew A
Publication details:
New York
McGraw-Hill/Osborne
c2006
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
TK5105.59 .H32 2006, ..
.
60.
Image from Google Jackets
Handbook of information security management
Micki Krause, Harold F. Tipton, editors
by
Krause, Micki
Tipton, Harold F
Publication details:
Boca Raton, FL
Auerbach
c1998
Availability:
No items available.
61.
Image from Google Jackets
Handbook of research on secure multimedia distribution
[edited by] Shiguo Lian, Yan Zhang
by
Lian, Shiguo
Zhang, Yan
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LIA
.
62.
Image from Google Jackets
Handbook of research on social and organizational liabilities in information security
[edited by] Manish Gupta, Raj Sharman
by
Gupta, Manish
Sharman, Raj
Publication details:
Hershey, PA
Information Science Reference
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GUP
.
63.
Image from Google Jackets
How to secure and audit Oracle 10g and 11g
Ron Ben Natan ; foreword by Pete Finnigan
by
Ben-Natan, Ron
Publication details:
Boca Raton, FL
CRC Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
64.
Image from Google Jackets
Human rights in the digital age
edited by Mathias Klang and Andrew Murray
by
Klang, Mathias
Murray, Andrew
Publication details:
London ; Portland, Or
GlassHouse
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.41085 KLA
.
65.
Image from Google Jackets
Implementation of the data protection Directive in relation to medical research in Europe
edited by D. Beyleveld ... [et al.]
by
Beyleveld, Deryck
Publication details:
Aldershot, Hants, England ; Burlington, VT
Ashgate
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.40858 BEY
.
66.
Image from Google Jackets
Information assurance : managing organizational IT security risks
Joseph G. Boyce, Dan W. Jennings
by
Boyce, Joseph George
Jennings, Dan Wesley
Publication details:
Oxford, UK ; Burlington, MA
Butterworth-Heinemann
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BOY
.
67.
Image from Google Jackets
Information assurance architecture
Keith D. WIllett
by
Willett, Keith D
Publication details:
Boca Raton, FL
CRC Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WIL
.
68.
Image from Google Jackets
Information law towards the 21st century
editors, Willem F. Korthals Altes ... [et at.]
by
Korthals Altes, Willem F
Publication details:
Dordrecht ; Boston
Kluwer Law and Taxation Publishers
1992
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0662 KOR
.
69.
Image from Google Jackets
Information privacy : statutes and regulations
Paul M. Schwartz, Daniel J. Solove
by
Schwartz, Paul M
Solove, Daniel J
Publication details:
Austin ; Frederick, MD
Aspen Publishers, Wolters Kluwer Law & Business
c2008-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342 SCH
.
70.
Image from Google Jackets
Information privacy law
Daniel J. Solove, Paul M. Schwartz
by
Solove, Daniel J
Schwartz, Paul M
Edition:
3rd ed
Publication details:
Austin
Aspen Publishers, Wolters Kluwer Law & Business
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 SOL
.
71.
Image from Google Jackets
Information security : protecting the global enterprise
Donald L. Pipkin
by
Pipkin, Donald L
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PIP
.
72.
Image from Google Jackets
Information security for global information infrastructures : IFIP TC 11 sixteenth annual working conference on information security, August 22-24, 2000, Beijing, China
edited by Sihan Qing, Jan H.P. Eloff
by
Eloff, Jan H. P
Qing, Sihan
IFIP TC11 Working Conference on Information Security (16th : 2000 : Beijing, China)
Publication details:
Dordrecht ; Boston
Kluwer Academic
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 QIN
.
73.
Image from Google Jackets
Information security management : concepts and practice
Bel G. Raggad
by
Raggad, Bel G
Publication details:
Boca Raton, FL
CRC Press/Taylor & Francis
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 RAG
.
74.
Image from Google Jackets
Information security management metrics : a definitive guide to effective security monitoring and measurement
W. Krag Brotby
by
Brotby, W. Krag
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 BRO
.
75.
Image from Google Jackets
Information security policies and procedures : a practitioner's reference
Thomas R. Peltier
by
Peltier, Thomas R
Edition:
2nd ed
Publication details:
Boca Raton, FL
Auerbach Publications
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PEL
.
76.
Image from Google Jackets
Information Technology and the law
H. Franken and Maria Samuel
by
Franken, H
Maria Samuel
Publication details:
New Delhi
Commonwealth
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004 SAM
.
77.
Image from Google Jackets
Information Technology law : the law and society
Andrew Murray
by
Murray, Andrew
Publication details:
Oxford
Oxford University Press
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.4109944 MUR
.
78.
Image from Google Jackets
Information Technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Jake Kouns, Daniel Minoli
by
Kouns, Jake
Minoli, Daniel
Publication details:
Hoboken, NJ
Wiley
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 KOU
.
79.
Image from Google Jackets
Information warfare
Daniel Ventre
by
Ventre, Daniel
Publication details:
London, UK ; Hoboken, NJ
ISTE Ltd. ; John Wiley & Sons
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
355.343 VEN
.
80.
Image from Google Jackets
Infosecurity 2008 threat analysis
[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
by
Clark, Champ
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
81.
Image from Google Jackets
International IT governance : an executive guide to ISO 17799/ISO 27001
Alan Calder & Steve Watkins
by
Calder, Alan
Watkins, Steve
Publication details:
Delhi
Kogan Page Limited
2006
Availability:
Items available for loan:
Anna Centenary Library
(3)
Call number:
005.8 CAL, ..
.
82.
Image from Google Jackets
IT governance : a manager's guide to data security and BS 7799/ISO 17799
Alan Calder, Steve Watkins
by
Calder, Alan
Watkins, Steve
Edition:
3rd ed
Publication details:
London ; Sterling, VA
Kogan Page
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
83.
Image from Google Jackets
IT governance : a manager's guide to data security and ISO 27001/ISO 27002
Alan Calder & Steve Watkins
by
Calder, Alan
Watkins, Steve
Edition:
4th ed
Publication details:
Delhi
Kogan Page Limited
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
84.
Image from Google Jackets
IT security metrics : a practical framework for measuring security & protecting data
Lance Hayden
by
Hayden, Lance
Publication details:
New York
McGraw Hill
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAY
.
85.
Image from Google Jackets
Law on the electronic frontier
Ian J. Lloyd and Moira Simpson
by
Lloyd, Ian J
Simpson, Moira
David Hume Institute
Publication details:
Edinburgh
Edinburgh University Press
1994
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
344.103999 LLO
.
86.
Image from Google Jackets
Law, information and information technology
edited by Eli Lederman, Ron Shapira
by
Lederman, Eli
Shapira, Ron
Publication details:
Alphen aan den Rijn, The Netherlands ; Frederick, MD
Kluwer Law International
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.09944 LED
.
87.
Image from Google Jackets
Lessons from the identity trail : anonymity, privacy, and identity in a networked society
edited by Ian Kerr, Valerie Steeves, and Carole Lucock
by
Kerr, Ian
Lucock, Carole
Steeves, Valerie M
Publication details:
Oxford
Oxford University Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 KER
.
88.
Image from Google Jackets
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors
Ron Ben Natan
by
Ben-Natan, Ron
Publication details:
Burlington, MA
Elsevier Digital Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
89.
Image from Google Jackets
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors
Ron Ben Natan
by
Ben-Natan, Ron
Publication details:
Burlington, MA
Elsevier Digital Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
90.
Image from Google Jackets
Information assurance for the enterprise : a roadmap to information security
Corey Schou, Dan Shoemaker
by
Schou, Corey
Shoemaker, Dan
Publication details:
Boston
McGraw-Hill Irwin
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
91.
Image from Google Jackets
Information assurance for the enterprise : a roadmap to information security
Corey Schou, Dan Shoemaker
by
Schou, Corey
Shoemaker, Dan
Publication details:
Boston
McGraw-Hill Irwin
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
QA76.9.A25 S3523 2007 005.8
.
92.
Image from Google Jackets
Information security management handbook
Harold F. Tipton, Micki Krause, [editors]
by
Krause, Micki
Tipton, Harold F
Edition:
6th ed
Publication details:
Boca Raton, FL
Auerbach Publications
c2007-2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TIP
.
93.
Image from Google Jackets
Information security management handbook
Harold F Tipton, Micki Krause
by
Tipton, Harold F
Krause, Micki
Edition:
6th ed
Publication details:
Boca Raton, FL
Auerbach Publications
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 TIP
.
94.
Image from Google Jackets
Information Technology law
Ian J. Lloyd
by
Lloyd, Ian J
Edition:
4th ed
Publication details:
Oxford
Oxford University Press
[2004]
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.410999 LLO
.
95.
Image from Google Jackets
Information Technology law
Ian J. Lloyd
by
Lloyd, Ian J
Edition:
5th ed
Publication details:
Oxford
Oxford University Press
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.3554 LLO
.
96.
Image from Google Jackets
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
QA76. 9. D348 O73 2009 005. 8/6, ..
.
97.
Image from Google Jackets
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005. 7575 CAR
.
98.
Image from Google Jackets
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Nodia
Pearson
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PFL
.
99.
Image from Google Jackets
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PFL
.
100.
Image from Google Jackets
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
QA76.9.A25 P45 2007 005.8
.
101.
Image from Google Jackets
The world beyond digital rights management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
2009
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
346.0482 UME, ..
.
102.
Image from Google Jackets
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law
Alan Calder
by
Calder, Alan
Publication details:
London
Kogan Page
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
103.
Image from Google Jackets
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law
Alan Calder
by
Calder, Alan
Publication details:
London
Kogan Page
c2005
Availability:
No items available.
104.
Image from Google Jackets
A practical guide to security engineering and information assurance
Debra S. Herrmann
by
Herrmann, Debra S
Publication details:
Boca Raton, FL
CRC Press
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HER
.
105.
Image from Google Jackets
Advanced communications and multimedia security : IFIP TC6/TC11 sixth joint working conference on communications and multimedia Security, September 26-27, 2002, Portorož, Slovenia
edited by Borka Jerman-Blažič, Tomaž Klobučar
by
Jerman-Blažič, Borka
Klobučar, Tomaž
IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (6th : 2002 : Portorož, Slovenia)
Publication details:
Boston
Kluwer Academic Publishers
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JER
.
106.
Image from Google Jackets
Advances in enterprise information technology security
Djamel Khadraoui and Francine Herrmann, editors
by
Herrmann, Francine
Khadraoui, Djamel
Publication details:
Hershey, PA
Information Science Reference
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KHA
.
107.
Image from Google Jackets
Analyzing computer security : a threat/vulnerability/countermeasure approach
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
Indian edition
Publication details:
New Delhi
2014
Availability:
Items available for loan:
Anna Centenary Library
(4).
108.
Image from Google Jackets
Anti-hacker tool kit
Mike Shema ... [et al.]
by
Shema, Mike
Jones, Keith J
Edition:
3rd ed
Publication details:
New York
McGraw-Hill/Osborne
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SHE
.
109.
Image from Google Jackets
Backup and recovery
W. Curtis Preston
by
Preston, W. Curtis
Publication details:
Beijing
O'Reilly
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.86 PRE
.
110.
Image from Google Jackets
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
No items available.
111.
Image from Google Jackets
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
No items available.
112.
Image from Google Jackets
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Nodia
Pearson
2009
Availability:
No items available.
113.
Image from Google Jackets
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
No items available.
114.
Image from Google Jackets
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
No items available.
115.
Image from Google Jackets
The world beyond digital rights management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
2009
Availability:
No items available.
116.
Image from Google Jackets
The world beyond digital rights management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
2009
Availability:
No items available.
117.
Image from Google Jackets
Data governance the definitive guide
/ Eryurek
people, processes, and tools to operationalize data trustworthiness
by
Eryurek, Evren
Uri Gilad, Valliappa Lakshmanan, Anita Kibunguchy, Jessi Ashdown
Edition:
1st ed.
Language:
English
Publication details:
Sebastopol, CA :
O'Reilly Media
c2021
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.74 ERY;1
.
Not available:
Anna Centenary Library: Checked out
(1).
118.
Image from Google Jackets
97 Things Every Information Security Professional Should Know Collective Wisdom From The Experts
/Christina Morillo
by
Morillo,Christina
Edition:
1st edition
Language:
English
Publication details:
, Sebastopol, California,
O'Reilly Media, Inc.
2021
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 MOR, ..
.
119.
Image from Google Jackets
Modern Data Protection Ensuring Recoverability Of All Modern Workloads
/ Preston
by
Preston
Language:
English
Publication details:
Mumbai
Shroff Publishers
2024
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 PRE, ..
.
120.
Image from Google Jackets
Serverless security
/Miguel A. Calles
: understand, assess, and implement secure and reliable applications in AWS, microsoft azure, and google cloud
by
Calles A, Miguel
Language:
English
Publication details:
New York :
Apress
c2020
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 CAL;1
.
Not available:
Anna Centenary Library: Checked out
(1).
121.
Image from Google Jackets
Security Policies And Implementation Issues
Rob Johnson
by
Johnson Rob
Language:
English
Publication details:
Sudbury, Mass.,
Jones & Bartlett Learning
,©2011
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005 JOH
.
122.
Image from Google Jackets
Software Testing And Continuous Quality Improvement, 3rd Edition
/William Lewis
by
Lewis, William
Edition:
3rd ed
Language:
English
Publication details:
Auerbach Publications,
2017
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.4 LEW
.
123.
Image from Google Jackets
Security Education And Critical Infrastructures
/ Cynthia Irvine, Helen Armstrong
by
Irvine, Cynthia
Language:
English
Publication details:
Kluwer Academic, Boston, Mass.,
2003
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 IRV
.
124.
Image from Google Jackets
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece /
edited by Dimitris Gritzalis ... [et al.].
by
Gritzalis, Dimitris
Series:
Language:
English
Publication details:
Boston :
Kluwer Academic Publishers,
c2003
Online resources:
Click here to access online
Click here to access online
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 GRI
.
125.
Image from Google Jackets
Research Directions In Data And Applications Security : ifip tc11/wg11.3 sixteenth annual conference on data and applications security, july 28-31, 2002, cambridge, uk
edited by Ehud Gudes and Sujeet Shenoi
by
Gudes, Ehud
Language:
English
Publication details:
London
Kluwer Academic Publishers
2003
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 GUD
.
126.
Image from Google Jackets
Security And Watermarking Of Multimedia Contents Iv : 21-24 january, 2002, san jose, [california] usa
/ Edward J. Delp, Ping Wah Wong
by
Delp, Edward J
Series:
Proceedings of SPIE--the International Society for Optical Engineering
; v. 4675
Language:
English
Publication details:
Bellingham, Wash.,
Spie
©2002
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 DEL
.
Find us on the map