Your search returned 116 results.

Sort
Results
1.
Managing catastrophic loss of sensitive data by Constantine Photopoulos by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 PHO.

2.
Managing cybersecurity resources : a cost-benefit analysis by Lawrence A. Gordon and Martin P. Loeb by
Publication details: New York McGraw-Hill c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GOR.

3.
Managing information assurance in financial services H. R. Rao, Manish Gupta, Shambhu J. Upadhyaya, [editors] by
Publication details: Hershey, PA IGI Pub 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 332.10684 RAO.

4.
Managing legal and security risks in computing and communications Paul D. Shaw by
Publication details: London ; New York Butterworth-Heinemann 1998
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.730999 SHA.

5.
Mastering system center data protection manager 2007 Devin L. Ganger, Ryan Femling by
Publication details: Indianapolis, IN Wiley Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 GAN.

6.
7.
Multimedia content encryption : techniques and applications Shiguo Lian by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 LIA.

8.
Multimedia forensics and security Chang-Tsun Li [editor] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LI.

9.
Negotiating privacy : the European union, the United States, and personal data protection Dorothee Heisenberg by
Publication details: Boulder, Colo Lynne Rienner Publishers 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.240858 HEI.

10.
Netcat power tools Jan Kanclirz Jr., technical editor; Brian Baskin, ... [et al] by
Publication details: Burlington, MA Syngress Publishing, Inc c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAN.

11.
Patriotic information systems Todd Loendorf & G. David Garson, editors by
Publication details: Hershey IGI Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 LOE.

12.
Privacy and human rights : an international and comparative study, with special reference to developments in information technology James Michael by
Publication details: Paris, France ; Aldershot, Hampshire, England Dartmouth Pub. Co., UNESCO c1994
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 MIC.

13.
Privacy protection for e-services [edited by] George Yee by
Publication details: Hershey, PA Idea Group Pub c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 YEE.

14.
Privacy, information, and technology Daniel J. Solove, Paul M. Schwartz by
Edition: 2nd ed
Publication details: New York Aspen Publishers c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 SOL.

15.
Protecting business information : a manager's guide James A. Schweitzer by
Publication details: Boston, MA Butterworth-Heinemann 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 SCH.

16.
The governance of privacy : policy instruments in global perspective Colin J. Bennett and Charles D. Raab by
Edition: [2nd and updated ed.]
Publication details: Cambridge, MA MIT Press c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 323.448309177 BEN.

17.
The information systems security officer's guide : establishing and managing an information protection program Gerald L. Kovacich by
Edition: 2nd ed
Publication details: Amsterdam ; Boston Butterworth-Heinemann c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KOV.

18.
The shellcoder's handbook : discovering and exploiting security holes Chris Anley ... [et al.] by
Edition: 2nd ed
Publication details: Indianapolis, IN Wiley Technology Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ANL.

19.
Tolley's data protection handbook Susan Singleton by
Edition: 4th ed
Publication details: London LexisNexis, Tolley 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.410858 SIN.

20.
21.
Virtual shadows : your privacy in the information society Karen Lawrence Öqvist by
Publication details: Swindon, UK BCS 2009
Availability: Items available for loan: Anna Centenary Library (3)Call number: 303.4833 OQV, ...

22.
World beyond digital Rights Management Jude C. Umeh by
Publication details: Swindon, UK BCS 1988
Availability: Items available for loan: Anna Centenary Library (1)Call number: 346.0482 UME.

23.
Borders in cyberspace : information policy and the global information infrastructure edited by Brian Kahin and Charles Nesson by
Edition: 1st ed
Publication details: Cambridge, MA MIT Press c1997
Availability: Items available for loan: Anna Centenary Library (1)Call number: 0204 KAH.

24.
Building a global information assurance program Raymond J. Curts, Douglas E. Campbell by
Publication details: Boca Raton, FL Auerbach Publications c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CUR.

25.
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives Ron Collette, Mike Gentile, Skye Gentile by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 COL.

26.
Collaborative computer security and trust management [edited by] Jean-Marc Seigneur, Adam Slagell by
Publication details: Hershey, PA Information Science Reference c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SEI.

27.
CompTIA security+ 2008 in depth Mark Ciampa by
Publication details: Australia Course Technology c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CIA.

28.
Computer security : 20 things every employee should know Ben Rothke by
Edition: 2nd ed
Publication details: New York McGraw-Hill c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

29.
Computer security lab manual Vincent J. Nestler ... [et al.] by
Publication details: Boston ; McGraw-Hill Irwin, c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NES.

30.
Concise European IT law edited by Alfred Büllesbach, Yves Poullet, Corien Prins by
Publication details: Alphen aan den Rijn ; Frederick, MD Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Pubishrs c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.240999 BUL.

31.
Copyright and electronic commerce : legal aspects of electronic copyright management editor, P. Bernt Hugenholtz ; contributors Kamiel J. Koelman ... [et al.] by
Publication details: The Hague ; Boston Kluwer Law 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 346.0482 HUG.

32.
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses Ed Skoudis with Tom Liston by
Edition: 2nd ed
Publication details: Upper Saddle River, N.J Prentice Hall Professional Technical Reference c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SKO.

33.
Critical infrastructures : state of the art in research and application edited by W.A.H. Thissen and P.M. Herder by
Publication details: Dordrecht ; Boston Kluwer Academic Publishers c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363 THI.

34.
Cyber law in Australia Eugene Clark ... [et al.] by
Publication details: The Hague ; Frederick, MD Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.940999 CLA.

35.
Cyber-security and global information assurance : threat analysis and response solutions Kenneth J. Knapp, editor by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KNA.

36.
Data leaks for dummies(r) Guy Bunker, Gareth Fraser-King by
Edition: 1st ed
Publication details: Hoboken, NJ Wiley Pub 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BUN.

37.
Data privacy and security David Salomon by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SAL.

38.
Data protection : a practical guide to UK and EU law Peter Carey by
Edition: 3rd ed
Publication details: Oxford Oxford University Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.240858 CAR.

39.
Data protection : governance, risk management, and compliance David G. Hill by
Publication details: Baca Raton, FL Taylor & Francis 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.86 HIL.

40.
Data protection and compliance in context Stewart Room by
Publication details: Swindon, U.K British Computer Society (BCS) c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.410858 ROO.

41.
Data protection and information lifecycle management Tom Petrocelli by
Publication details: Upper Saddle River, NJ Prentice Hall Professional Technical Reference c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PET.

42.
Data protection law : approaching its rationale, logic, and limits by Lee A. Bygrave by
Publication details: Alphen aan den Rijn, The Netherlands ; Frederick, MD Kluwer Law International 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 BYG.

43.
Data protection law and practice Rosemary Jay by
Publication details: London Sweet & Maxwell ©2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.410858 ROS.

44.
Dictionary of information security Robert Slade by
Publication details: Rockland, MA Syngress Publishing 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SLA.

45.
Digital anonymity and the law : tensions and dimensions edited by C. Nicoll, J.E.J. Prins, M.J.M. van Dellen by
Publication details: The Hague T.M.C. Asser Press c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 NIC.

46.
Digital defense : what you should know about protecting your company's assets Thomas J. Parenty by
Publication details: Boston Harvard Business School 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 PAR.

47.
Digital rights management Joan Van Tassel by
Publication details: Amsterdam ; Boston Focal 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TAS.

48.
Digital rights management : technological, economic, legal and political aspects Eberhard Becker ... [et al.] by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEC.

49.
Digital rights management for e-commerce systems Dimitrios Tsolis ... [et al.] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TSO.

50.
Digital watermarking and steganography Ingemar J. Cox ... [et al.] by
Edition: 2nd ed
Publication details: Amsterdam ; Boston Morgan Kaufmann Publishers c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COX.

51.
Disaster recovery : principles and practices April J. Wells, Charlyne Walker and Timothy Walker by
Publication details: Upper Saddle River, N.J Pearson Prentice Hall 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.348 WEL.

52.
Disaster recovery planning : preparing for the unthinkable Jon William Toigo ; with illustrations by Margaret Romao Toigo by
Edition: 3rd ed
Publication details: Upper Saddle River, NJ Prentice Hall 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 TOI.

53.
European data protection law : corporate compliance and regulation Christopher Kuner by
Edition: 2nd ed
Publication details: Oxford Oxford University Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.240858 KUN.

54.
Financial crime in the EU : criminal records as effective tools or missed opportunities edited by Constantin Stefanou and Helen Xanthaki by
Publication details: Alphen aan den Rijn, The Netherlands ; Frederick, MD Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.4077 STE.

55.
Global perspectives in information security : legal, social and international issues edited by Hossein Bidgoli by
Publication details: Hoboken, NJ J. Wiley & Sons 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.7309944 BID.

56.
Global privacy and security law Francoise Gilbert by
Publication details: Austin Wolters Kluwer Law & Business ; Frederick, MD ; Aspen Publishers ©2009-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.05246 GIL.1.

57.
Global privacy protection : the first generation edited by James B. Rule and Graham Greenleaf by
Publication details: Cheltenham, UK ; North Hampton, MA, USA E. Elgar c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 RUL.

58.
Hacking exposed 6 : network security secrets & solutions Stuart McClure, Joel Scambray, George Kurtz by
Edition: 10th anniversary ed
Publication details: New York McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 MCC, ...

59.
Hacking exposed Cisco networks : Cisco security secrets & solutions Andrew A. Vladimirov ... [et al.] by
Publication details: New York McGraw-Hill/Osborne c2006
Availability: Items available for loan: Anna Centenary Library (2)Call number: TK5105.59 .H32 2006, ...

60.
Handbook of information security management Micki Krause, Harold F. Tipton, editors by
Publication details: Boca Raton, FL Auerbach c1998
Availability: No items available.

61.
Handbook of research on secure multimedia distribution [edited by] Shiguo Lian, Yan Zhang by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LIA.

62.
Handbook of research on social and organizational liabilities in information security [edited by] Manish Gupta, Raj Sharman by
Publication details: Hershey, PA Information Science Reference 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GUP.

63.
How to secure and audit Oracle 10g and 11g Ron Ben Natan ; foreword by Pete Finnigan by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

64.
Human rights in the digital age edited by Mathias Klang and Andrew Murray by
Publication details: London ; Portland, Or GlassHouse 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.41085 KLA.

65.
Implementation of the data protection Directive in relation to medical research in Europe edited by D. Beyleveld ... [et al.] by
Publication details: Aldershot, Hants, England ; Burlington, VT Ashgate c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.40858 BEY.

66.
Information assurance : managing organizational IT security risks Joseph G. Boyce, Dan W. Jennings by
Publication details: Oxford, UK ; Burlington, MA Butterworth-Heinemann c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BOY.

67.
Information assurance architecture Keith D. WIllett by
Publication details: Boca Raton, FL CRC Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WIL.

68.
Information law towards the 21st century editors, Willem F. Korthals Altes ... [et at.] by
Publication details: Dordrecht ; Boston Kluwer Law and Taxation Publishers 1992
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0662 KOR.

69.
Information privacy : statutes and regulations Paul M. Schwartz, Daniel J. Solove by
Publication details: Austin ; Frederick, MD Aspen Publishers, Wolters Kluwer Law & Business c2008-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342 SCH.

70.
Information privacy law Daniel J. Solove, Paul M. Schwartz by
Edition: 3rd ed
Publication details: Austin Aspen Publishers, Wolters Kluwer Law & Business c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.730858 SOL.

71.
Information security : protecting the global enterprise Donald L. Pipkin by
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PIP.

72.
73.
Information security management : concepts and practice Bel G. Raggad by
Publication details: Boca Raton, FL CRC Press/Taylor & Francis c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RAG.

74.
Information security management metrics : a definitive guide to effective security monitoring and measurement W. Krag Brotby by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 BRO.

75.
Information security policies and procedures : a practitioner's reference Thomas R. Peltier by
Edition: 2nd ed
Publication details: Boca Raton, FL Auerbach Publications c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PEL.

76.
Information Technology and the law H. Franken and Maria Samuel by
Publication details: New Delhi Commonwealth 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004 SAM.

77.
Information Technology law : the law and society Andrew Murray by
Publication details: Oxford Oxford University Press 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.4109944 MUR.

78.
Information Technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams Jake Kouns, Daniel Minoli by
Publication details: Hoboken, NJ Wiley 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 KOU.

79.
Information warfare Daniel Ventre by
Publication details: London, UK ; Hoboken, NJ ISTE Ltd. ; John Wiley & Sons c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 355.343 VEN.

80.
Infosecurity 2008 threat analysis [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

81.
International IT governance : an executive guide to ISO 17799/ISO 27001 Alan Calder & Steve Watkins by
Publication details: Delhi Kogan Page Limited 2006
Availability: Items available for loan: Anna Centenary Library (3)Call number: 005.8 CAL, ...

82.
IT governance : a manager's guide to data security and BS 7799/ISO 17799 Alan Calder, Steve Watkins by
Edition: 3rd ed
Publication details: London ; Sterling, VA Kogan Page 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

83.
IT governance : a manager's guide to data security and ISO 27001/ISO 27002 Alan Calder & Steve Watkins by
Edition: 4th ed
Publication details: Delhi Kogan Page Limited 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

84.
IT security metrics : a practical framework for measuring security & protecting data Lance Hayden by
Publication details: New York McGraw Hill c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAY.

85.
Law on the electronic frontier Ian J. Lloyd and Moira Simpson by
Publication details: Edinburgh Edinburgh University Press 1994
Availability: Items available for loan: Anna Centenary Library (1)Call number: 344.103999 LLO.

86.
Law, information and information technology edited by Eli Lederman, Ron Shapira by
Publication details: Alphen aan den Rijn, The Netherlands ; Frederick, MD Kluwer Law International c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.09944 LED.

87.
Lessons from the identity trail : anonymity, privacy, and identity in a networked society edited by Ian Kerr, Valerie Steeves, and Carole Lucock by
Publication details: Oxford Oxford University Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 342.0858 KER.

88.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors Ron Ben Natan by
Publication details: Burlington, MA Elsevier Digital Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

89.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors Ron Ben Natan by
Publication details: Burlington, MA Elsevier Digital Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEN.

90.
Information assurance for the enterprise : a roadmap to information security Corey Schou, Dan Shoemaker by
Publication details: Boston McGraw-Hill Irwin c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

91.
Information assurance for the enterprise : a roadmap to information security Corey Schou, Dan Shoemaker by
Publication details: Boston McGraw-Hill Irwin c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: QA76.9.A25 S3523 2007 005.8.

92.
Information security management handbook Harold F. Tipton, Micki Krause, [editors] by
Edition: 6th ed
Publication details: Boca Raton, FL Auerbach Publications c2007-2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TIP.

93.
Information security management handbook Harold F Tipton, Micki Krause by
Edition: 6th ed
Publication details: Boca Raton, FL Auerbach Publications 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 TIP.

94.
Information Technology law Ian J. Lloyd by
Edition: 4th ed
Publication details: Oxford Oxford University Press [2004]
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.410999 LLO.

95.
Information Technology law Ian J. Lloyd by
Edition: 5th ed
Publication details: Oxford Oxford University Press 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.3554 LLO.

96.
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: QA76. 9. D348 O73 2009 005. 8/6, ...

97.
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005. 7575 CAR.

98.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Nodia Pearson 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PFL.

99.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PFL.

100.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: QA76.9.A25 P45 2007 005.8.

101.
The world beyond digital rights management Jude C. Umeh by
Publication details: Swindon, UK BCS 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 346.0482 UME, ...

102.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law Alan Calder by
Publication details: London Kogan Page c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL.

103.
104.
A practical guide to security engineering and information assurance Debra S. Herrmann by
Publication details: Boca Raton, FL CRC Press c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HER.

105.
106.
Advances in enterprise information technology security Djamel Khadraoui and Francine Herrmann, editors by
Publication details: Hershey, PA Information Science Reference c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KHA.

107.
Analyzing computer security : a threat/vulnerability/countermeasure approach Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: Indian edition
Publication details: New Delhi 2014
Availability: Items available for loan: Anna Centenary Library (4).

108.
Anti-hacker tool kit Mike Shema ... [et al.] by
Edition: 3rd ed
Publication details: New York McGraw-Hill/Osborne c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHE.

109.
Backup and recovery W. Curtis Preston by
Publication details: Beijing O'Reilly c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.86 PRE.

110.
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: No items available.

111.
Oracle data guard 11g handbook Larry Carpenter... [et al. ] by
Publication details: New York Oracle Press/McGraw-Hill c2009
Availability: No items available.

112.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Nodia Pearson 2009
Availability: No items available.

113.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: No items available.

114.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th ed
Publication details: Upper Saddle River, NJ Prentice Hall c2007
Availability: No items available.

115.
The world beyond digital rights management Jude C. Umeh by
Publication details: Swindon, UK BCS 2009
Availability: No items available.

116.
The world beyond digital rights management Jude C. Umeh by
Publication details: Swindon, UK BCS 2009
Availability: No items available.

Pages

Find us on the map

Powered by Koha