Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Data protection"'
Refine your search
Availability
Limit to records with available items
Authors
Ben-Natan, Ron
Calder, Alan
Carey, Peter
Carpenter, Larry
Gupta, Manish
Krause, Micki
Lian, Shiguo
Lloyd, Ian J
Murray, Andrew
Pfleeger, Charles P
Pfleeger, Shari Lawr...
Rao, H. R
Schou, Corey
Schwartz, Paul M
Shema, Mike
Shoemaker, Dan
Solove, Daniel J
Tipton, Harold F
Umeh, Jude C
Watkins, Steve
Show more
Show less
Item types
Books
English Books
Topics
Business - Data proc...
Business enterprises...
Computer networks - ...
Computer science
Computer security
Computers - Law and ...
Copyright and electr...
Data protection
Data protection - Co...
Data protection - Ha...
Data protection - La...
Data protection - La...
Data protection - La...
Data protection - La...
Data recovery (Compu...
Database security
Information technolo...
Oracle (Computer fil...
Privacy, Right of
Privacy, Right of - ...
Show more
Show less
Your search returned 116 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managing catastrophic loss of sensitive data
by Constantine Photopoulos
by
Photopoulos, Constantine
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 PHO
.
2.
Managing cybersecurity resources : a cost-benefit analysis
by Lawrence A. Gordon and Martin P. Loeb
by
Gordon, Lawrence A
Loeb, Martin P
Publication details:
New York
McGraw-Hill
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GOR
.
3.
Managing information assurance in financial services
H. R. Rao, Manish Gupta, Shambhu J. Upadhyaya, [editors]
by
Gupta, Manish
Rao, H. R
Upadhyaya, Shambhu
Publication details:
Hershey, PA
IGI Pub
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
332.10684 RAO
.
4.
Managing legal and security risks in computing and communications
Paul D. Shaw
by
Shaw, Paul
Publication details:
London ; New York
Butterworth-Heinemann
1998
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.730999 SHA
.
5.
Mastering system center data protection manager 2007
Devin L. Ganger, Ryan Femling
by
Ganger, Devin L
Femling, Ryan
Publication details:
Indianapolis, IN
Wiley Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6 GAN
.
6.
Media forensics and security II : 18-20 January 2010, San Jose, California, United States
Nasir D. Memon ... [et al.], editors ; sponsored and published by IS & T--the Society for Imaging Science and Technology [and] SPIE ; cosponsored by Digital Watermarking Alliance
by
Memon, Nasir D
Digital Watermarking Alliance, Electronic Imaging Science and Technology Symposium (2010 : San Jose, Calif.), IS & T--the Society for Imaging Science and Technology, SPIE (Society)
Publication details:
Bellingham, WA
SPIE
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MEM
.
7.
Multimedia content encryption : techniques and applications
Shiguo Lian
by
Lian, Shiguo
Publication details:
Boca Raton, FL
CRC Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 LIA
.
8.
Multimedia forensics and security
Chang-Tsun Li [editor]
by
Li, Chang-Tsun
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LI
.
9.
Negotiating privacy : the European union, the United States, and personal data protection
Dorothee Heisenberg
by
Heisenberg, Dorothee
Publication details:
Boulder, Colo
Lynne Rienner Publishers
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.240858 HEI
.
10.
Netcat power tools
Jan Kanclirz Jr., technical editor; Brian Baskin, ... [et al]
by
Baskin, Brian
Kanclirz, Jan
Publication details:
Burlington, MA
Syngress Publishing, Inc
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAN
.
11.
Patriotic information systems
Todd Loendorf & G. David Garson, editors
by
Garson, G. David
Loendorf, Todd
Publication details:
Hershey
IGI Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 LOE
.
12.
Privacy and human rights : an international and comparative study, with special reference to developments in information technology
James Michael
by
Michael, James
Publication details:
Paris, France ; Aldershot, Hampshire, England
Dartmouth Pub. Co., UNESCO
c1994
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 MIC
.
13.
Privacy protection for e-services
[edited by] George Yee
by
Yee, George
Publication details:
Hershey, PA
Idea Group Pub
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 YEE
.
14.
Privacy, information, and technology
Daniel J. Solove, Paul M. Schwartz
by
Solove, Daniel J
Schwartz, Paul M
Edition:
2nd ed
Publication details:
New York
Aspen Publishers
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 SOL
.
15.
Protecting business information : a manager's guide
James A. Schweitzer
by
Schweitzer, James A
Publication details:
Boston, MA
Butterworth-Heinemann
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 SCH
.
16.
The governance of privacy : policy instruments in global perspective
Colin J. Bennett and Charles D. Raab
by
Bennett, Colin J
Raab, Charles D
Edition:
[2nd and updated ed.]
Publication details:
Cambridge, MA
MIT Press
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
323.448309177 BEN
.
17.
The information systems security officer's guide : establishing and managing an information protection program
Gerald L. Kovacich
by
Kovacich, Gerald L
Edition:
2nd ed
Publication details:
Amsterdam ; Boston
Butterworth-Heinemann
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KOV
.
18.
The shellcoder's handbook : discovering and exploiting security holes
Chris Anley ... [et al.]
by
Anley, Chris
Edition:
2nd ed
Publication details:
Indianapolis, IN
Wiley Technology Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ANL
.
19.
Tolley's data protection handbook
Susan Singleton
by
Singleton, Susan
Edition:
4th ed
Publication details:
London
LexisNexis, Tolley
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.410858 SIN
.
20.
No cover image available
Trusted information : the new decade challenge : IFIP TC11 16th international conference on information security (IFIP/Sec'01), June 11-13, 2001, Paris, France
edited by Michel Dupuy, Pierre Paradinas
by
Dupuy, Michel
Paradinas, Pierre
IFIP TC11 International Conference on Information Security (16th : 2001 : Paris, France)
Publication details:
Dordrecht ; Boston, MA
Kluwer Academic Publishers
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DUP
.
21.
Virtual shadows : your privacy in the information society
Karen Lawrence Öqvist
by
Öqvist, Karen Lawrence
British Computer Society
Publication details:
Swindon, UK
BCS
2009
Availability:
Items available for loan:
Anna Centenary Library
(3)
Call number:
303.4833 OQV, ..
.
22.
World beyond digital Rights Management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
1988
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
346.0482 UME
.
23.
Borders in cyberspace : information policy and the global information infrastructure
edited by Brian Kahin and Charles Nesson
by
Kahin, Brian
Nesson, Charles R
Edition:
1st ed
Publication details:
Cambridge, MA
MIT Press
c1997
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
0204 KAH
.
24.
Building a global information assurance program
Raymond J. Curts, Douglas E. Campbell
by
Curts, Raymond J
Campbell, Douglas E
Publication details:
Boca Raton, FL
Auerbach Publications
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CUR
.
25.
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
Ron Collette, Mike Gentile, Skye Gentile
by
Collette, Ronald D
Gentile, Michael
Gentile, Skye
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 COL
.
26.
Collaborative computer security and trust management
[edited by] Jean-Marc Seigneur, Adam Slagell
by
Seigneur, Jean-Marc
Slagell, Adam
Publication details:
Hershey, PA
Information Science Reference
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SEI
.
27.
CompTIA security+ 2008 in depth
Mark Ciampa
by
Ciampa, Mark D
Publication details:
Australia
Course Technology
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CIA
.
28.
Computer security : 20 things every employee should know
Ben Rothke
by
Rothke, Ben
Edition:
2nd ed
Publication details:
New York
McGraw-Hill
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
29.
No cover image available
Computer security lab manual
Vincent J. Nestler ... [et al.]
by
Nestler, Vincent J
Publication details:
Boston ; McGraw-Hill Irwin, c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NES
.
30.
Concise European IT law
edited by Alfred Büllesbach, Yves Poullet, Corien Prins
by
Büllesbach, Alfred
Poullet, Yves
Prins, C
Publication details:
Alphen aan den Rijn ; Frederick, MD
Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Pubishrs
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.240999 BUL
.
31.
Copyright and electronic commerce : legal aspects of electronic copyright management
editor, P. Bernt Hugenholtz ; contributors Kamiel J. Koelman ... [et al.]
by
Hugenholtz, P. B
Koelman, Kamiel
Publication details:
The Hague ; Boston
Kluwer Law
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
346.0482 HUG
.
32.
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Ed Skoudis with Tom Liston
by
Skoudis, Ed
Liston, Tom
Edition:
2nd ed
Publication details:
Upper Saddle River, N.J
Prentice Hall Professional Technical Reference
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SKO
.
33.
Critical infrastructures : state of the art in research and application
edited by W.A.H. Thissen and P.M. Herder
by
Herder, Paulien Minke
Thissen, Wil A. H
International Conference on Technology, Policy, and Innovation (5th : 2001 : Hague, Netherlands)
Publication details:
Dordrecht ; Boston
Kluwer Academic Publishers
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363 THI
.
34.
Cyber law in Australia
Eugene Clark ... [et al.]
by
Clark, E. Eugene
Publication details:
The Hague ; Frederick, MD
Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.940999 CLA
.
35.
Cyber-security and global information assurance : threat analysis and response solutions
Kenneth J. Knapp, editor
by
Knapp, Kenneth J
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KNA
.
36.
Data leaks for dummies(r)
Guy Bunker, Gareth Fraser-King
by
Bunker, Guy
Edition:
1st ed
Publication details:
Hoboken, NJ
Wiley Pub
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BUN
.
37.
Data privacy and security
David Salomon
by
Salomon, D
Publication details:
Berlin
Springer
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SAL
.
38.
Data protection : a practical guide to UK and EU law
Peter Carey
by
Carey, Peter
Edition:
3rd ed
Publication details:
Oxford
Oxford University Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.240858 CAR
.
39.
Data protection : governance, risk management, and compliance
David G. Hill
by
Hill, David G
Publication details:
Baca Raton, FL
Taylor & Francis
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.86 HIL
.
40.
Data protection and compliance in context
Stewart Room
by
Room, Stewart
Publication details:
Swindon, U.K
British Computer Society (BCS)
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.410858 ROO
.
41.
Data protection and information lifecycle management
Tom Petrocelli
by
Petrocelli, Thomas D
Publication details:
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PET
.
42.
Data protection law : approaching its rationale, logic, and limits
by Lee A. Bygrave
by
Bygrave, Lee A
Publication details:
Alphen aan den Rijn, The Netherlands ; Frederick, MD
Kluwer Law International
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 BYG
.
43.
Data protection law and practice
Rosemary Jay
by
Jay, Rosemary
Publication details:
London
Sweet & Maxwell
©2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.410858 ROS
.
44.
Dictionary of information security
Robert Slade
by
Slade, Robert
Publication details:
Rockland, MA
Syngress Publishing
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SLA
.
45.
Digital anonymity and the law : tensions and dimensions
edited by C. Nicoll, J.E.J. Prins, M.J.M. van Dellen
by
Dellen, M J M Van
Nicoll, C
Prins, J E J
Publication details:
The Hague
T.M.C. Asser Press
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 NIC
.
46.
Digital defense : what you should know about protecting your company's assets
Thomas J. Parenty
by
Parenty, Thomas J
Publication details:
Boston
Harvard Business School
2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 PAR
.
47.
Digital rights management
Joan Van Tassel
by
Van Tassel, Joan M
Publication details:
Amsterdam ; Boston
Focal
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TAS
.
48.
Digital rights management : technological, economic, legal and political aspects
Eberhard Becker ... [et al.]
by
Becker, Eberhard
Publication details:
Berlin
Springer
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEC
.
49.
Digital rights management for e-commerce systems
Dimitrios Tsolis ... [et al.]
by
Tsolis, Dimitrios
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TSO
.
50.
Digital watermarking and steganography
Ingemar J. Cox ... [et al.]
by
Cox, I. J
Edition:
2nd ed
Publication details:
Amsterdam ; Boston
Morgan Kaufmann Publishers
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 COX
.
51.
Disaster recovery : principles and practices
April J. Wells, Charlyne Walker and Timothy Walker
by
Wells, April J
Walker, Charlyne
Walker, Timothy
Publication details:
Upper Saddle River, N.J
Pearson Prentice Hall
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.348 WEL
.
52.
Disaster recovery planning : preparing for the unthinkable
Jon William Toigo ; with illustrations by Margaret Romao Toigo
by
Toigo, Jon William
Edition:
3rd ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 TOI
.
53.
European data protection law : corporate compliance and regulation
Christopher Kuner
by
Kuner, Christopher
Edition:
2nd ed
Publication details:
Oxford
Oxford University Press
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.240858 KUN
.
54.
Financial crime in the EU : criminal records as effective tools or missed opportunities
edited by Constantin Stefanou and Helen Xanthaki
by
Stephanou, Constantine A
Xanthaki, Helen
Publication details:
Alphen aan den Rijn, The Netherlands ; Frederick, MD
Kluwer Law International ; Sold and distributed in North, Central, and South America by Aspen Publishers
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.4077 STE
.
55.
Global perspectives in information security : legal, social and international issues
edited by Hossein Bidgoli
by
Bidgoli, Hossein
Publication details:
Hoboken, NJ
J. Wiley & Sons
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.7309944 BID
.
56.
No cover image available
Global privacy and security law
Francoise Gilbert
by
Gilbert, Francoise
American Association of Law Libraries. Annual Meeting and Conference (97th : 2004 July 10-14 : Boston, Mass.), Bureau of National Affairs (Arlington, Va.)
Publication details:
Austin
Wolters Kluwer Law & Business ; Frederick, MD ; Aspen Publishers
©2009-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.05246 GIL.1
.
57.
Global privacy protection : the first generation
edited by James B. Rule and Graham Greenleaf
by
Greenleaf, G. W
Rule, James B
Publication details:
Cheltenham, UK ; North Hampton, MA, USA
E. Elgar
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 RUL
.
58.
Hacking exposed 6 : network security secrets & solutions
Stuart McClure, Joel Scambray, George Kurtz
by
McClure, Stuart
Kurtz, George
Scambray, Joel
Edition:
10th anniversary ed
Publication details:
New York
McGraw-Hill
c2009
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 MCC, ..
.
59.
Hacking exposed Cisco networks : Cisco security secrets & solutions
Andrew A. Vladimirov ... [et al.]
by
Vladimirov, Andrew A
Publication details:
New York
McGraw-Hill/Osborne
c2006
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
TK5105.59 .H32 2006, ..
.
60.
Handbook of information security management
Micki Krause, Harold F. Tipton, editors
by
Krause, Micki
Tipton, Harold F
Publication details:
Boca Raton, FL
Auerbach
c1998
Availability:
No items available.
61.
Handbook of research on secure multimedia distribution
[edited by] Shiguo Lian, Yan Zhang
by
Lian, Shiguo
Zhang, Yan
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LIA
.
62.
Handbook of research on social and organizational liabilities in information security
[edited by] Manish Gupta, Raj Sharman
by
Gupta, Manish
Sharman, Raj
Publication details:
Hershey, PA
Information Science Reference
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GUP
.
63.
How to secure and audit Oracle 10g and 11g
Ron Ben Natan ; foreword by Pete Finnigan
by
Ben-Natan, Ron
Publication details:
Boca Raton, FL
CRC Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
64.
Human rights in the digital age
edited by Mathias Klang and Andrew Murray
by
Klang, Mathias
Murray, Andrew
Publication details:
London ; Portland, Or
GlassHouse
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.41085 KLA
.
65.
Implementation of the data protection Directive in relation to medical research in Europe
edited by D. Beyleveld ... [et al.]
by
Beyleveld, Deryck
Publication details:
Aldershot, Hants, England ; Burlington, VT
Ashgate
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.40858 BEY
.
66.
Information assurance : managing organizational IT security risks
Joseph G. Boyce, Dan W. Jennings
by
Boyce, Joseph George
Jennings, Dan Wesley
Publication details:
Oxford, UK ; Burlington, MA
Butterworth-Heinemann
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BOY
.
67.
Information assurance architecture
Keith D. WIllett
by
Willett, Keith D
Publication details:
Boca Raton, FL
CRC Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WIL
.
68.
Information law towards the 21st century
editors, Willem F. Korthals Altes ... [et at.]
by
Korthals Altes, Willem F
Publication details:
Dordrecht ; Boston
Kluwer Law and Taxation Publishers
1992
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0662 KOR
.
69.
Information privacy : statutes and regulations
Paul M. Schwartz, Daniel J. Solove
by
Schwartz, Paul M
Solove, Daniel J
Publication details:
Austin ; Frederick, MD
Aspen Publishers, Wolters Kluwer Law & Business
c2008-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342 SCH
.
70.
Information privacy law
Daniel J. Solove, Paul M. Schwartz
by
Solove, Daniel J
Schwartz, Paul M
Edition:
3rd ed
Publication details:
Austin
Aspen Publishers, Wolters Kluwer Law & Business
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.730858 SOL
.
71.
Information security : protecting the global enterprise
Donald L. Pipkin
by
Pipkin, Donald L
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PIP
.
72.
Information security for global information infrastructures : IFIP TC 11 sixteenth annual working conference on information security, August 22-24, 2000, Beijing, China
edited by Sihan Qing, Jan H.P. Eloff
by
Eloff, Jan H. P
Qing, Sihan
IFIP TC11 Working Conference on Information Security (16th : 2000 : Beijing, China)
Publication details:
Dordrecht ; Boston
Kluwer Academic
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 QIN
.
73.
Information security management : concepts and practice
Bel G. Raggad
by
Raggad, Bel G
Publication details:
Boca Raton, FL
CRC Press/Taylor & Francis
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 RAG
.
74.
Information security management metrics : a definitive guide to effective security monitoring and measurement
W. Krag Brotby
by
Brotby, W. Krag
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 BRO
.
75.
Information security policies and procedures : a practitioner's reference
Thomas R. Peltier
by
Peltier, Thomas R
Edition:
2nd ed
Publication details:
Boca Raton, FL
Auerbach Publications
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PEL
.
76.
Information Technology and the law
H. Franken and Maria Samuel
by
Franken, H
Maria Samuel
Publication details:
New Delhi
Commonwealth
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004 SAM
.
77.
Information Technology law : the law and society
Andrew Murray
by
Murray, Andrew
Publication details:
Oxford
Oxford University Press
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.4109944 MUR
.
78.
Information Technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Jake Kouns, Daniel Minoli
by
Kouns, Jake
Minoli, Daniel
Publication details:
Hoboken, NJ
Wiley
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 KOU
.
79.
Information warfare
Daniel Ventre
by
Ventre, Daniel
Publication details:
London, UK ; Hoboken, NJ
ISTE Ltd. ; John Wiley & Sons
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
355.343 VEN
.
80.
Infosecurity 2008 threat analysis
[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
by
Clark, Champ
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
81.
International IT governance : an executive guide to ISO 17799/ISO 27001
Alan Calder & Steve Watkins
by
Calder, Alan
Watkins, Steve
Publication details:
Delhi
Kogan Page Limited
2006
Availability:
Items available for loan:
Anna Centenary Library
(3)
Call number:
005.8 CAL, ..
.
82.
IT governance : a manager's guide to data security and BS 7799/ISO 17799
Alan Calder, Steve Watkins
by
Calder, Alan
Watkins, Steve
Edition:
3rd ed
Publication details:
London ; Sterling, VA
Kogan Page
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
83.
IT governance : a manager's guide to data security and ISO 27001/ISO 27002
Alan Calder & Steve Watkins
by
Calder, Alan
Watkins, Steve
Edition:
4th ed
Publication details:
Delhi
Kogan Page Limited
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
84.
IT security metrics : a practical framework for measuring security & protecting data
Lance Hayden
by
Hayden, Lance
Publication details:
New York
McGraw Hill
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAY
.
85.
Law on the electronic frontier
Ian J. Lloyd and Moira Simpson
by
Lloyd, Ian J
Simpson, Moira
David Hume Institute
Publication details:
Edinburgh
Edinburgh University Press
1994
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
344.103999 LLO
.
86.
Law, information and information technology
edited by Eli Lederman, Ron Shapira
by
Lederman, Eli
Shapira, Ron
Publication details:
Alphen aan den Rijn, The Netherlands ; Frederick, MD
Kluwer Law International
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.09944 LED
.
87.
Lessons from the identity trail : anonymity, privacy, and identity in a networked society
edited by Ian Kerr, Valerie Steeves, and Carole Lucock
by
Kerr, Ian
Lucock, Carole
Steeves, Valerie M
Publication details:
Oxford
Oxford University Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
342.0858 KER
.
88.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors
Ron Ben Natan
by
Ben-Natan, Ron
Publication details:
Burlington, MA
Elsevier Digital Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
89.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors
Ron Ben Natan
by
Ben-Natan, Ron
Publication details:
Burlington, MA
Elsevier Digital Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEN
.
90.
Information assurance for the enterprise : a roadmap to information security
Corey Schou, Dan Shoemaker
by
Schou, Corey
Shoemaker, Dan
Publication details:
Boston
McGraw-Hill Irwin
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
91.
Information assurance for the enterprise : a roadmap to information security
Corey Schou, Dan Shoemaker
by
Schou, Corey
Shoemaker, Dan
Publication details:
Boston
McGraw-Hill Irwin
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
QA76.9.A25 S3523 2007 005.8
.
92.
Information security management handbook
Harold F. Tipton, Micki Krause, [editors]
by
Krause, Micki
Tipton, Harold F
Edition:
6th ed
Publication details:
Boca Raton, FL
Auerbach Publications
c2007-2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TIP
.
93.
Information security management handbook
Harold F Tipton, Micki Krause
by
Tipton, Harold F
Krause, Micki
Edition:
6th ed
Publication details:
Boca Raton, FL
Auerbach Publications
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 TIP
.
94.
Information Technology law
Ian J. Lloyd
by
Lloyd, Ian J
Edition:
4th ed
Publication details:
Oxford
Oxford University Press
[2004]
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.410999 LLO
.
95.
Information Technology law
Ian J. Lloyd
by
Lloyd, Ian J
Edition:
5th ed
Publication details:
Oxford
Oxford University Press
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.3554 LLO
.
96.
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
QA76. 9. D348 O73 2009 005. 8/6, ..
.
97.
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005. 7575 CAR
.
98.
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Nodia
Pearson
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PFL
.
99.
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PFL
.
100.
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
QA76.9.A25 P45 2007 005.8
.
101.
The world beyond digital rights management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
2009
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
346.0482 UME, ..
.
102.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law
Alan Calder
by
Calder, Alan
Publication details:
London
Kogan Page
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
103.
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law
Alan Calder
by
Calder, Alan
Publication details:
London
Kogan Page
c2005
Availability:
No items available.
104.
A practical guide to security engineering and information assurance
Debra S. Herrmann
by
Herrmann, Debra S
Publication details:
Boca Raton, FL
CRC Press
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HER
.
105.
Advanced communications and multimedia security : IFIP TC6/TC11 sixth joint working conference on communications and multimedia Security, September 26-27, 2002, Portorož, Slovenia
edited by Borka Jerman-Blažič, Tomaž Klobučar
by
Jerman-Blažič, Borka
Klobučar, Tomaž
IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (6th : 2002 : Portorož, Slovenia)
Publication details:
Boston
Kluwer Academic Publishers
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JER
.
106.
Advances in enterprise information technology security
Djamel Khadraoui and Francine Herrmann, editors
by
Herrmann, Francine
Khadraoui, Djamel
Publication details:
Hershey, PA
Information Science Reference
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KHA
.
107.
Analyzing computer security : a threat/vulnerability/countermeasure approach
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
Indian edition
Publication details:
New Delhi
2014
Availability:
Items available for loan:
Anna Centenary Library
(4).
108.
Anti-hacker tool kit
Mike Shema ... [et al.]
by
Shema, Mike
Jones, Keith J
Edition:
3rd ed
Publication details:
New York
McGraw-Hill/Osborne
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SHE
.
109.
Backup and recovery
W. Curtis Preston
by
Preston, W. Curtis
Publication details:
Beijing
O'Reilly
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.86 PRE
.
110.
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
No items available.
111.
Oracle data guard 11g handbook
Larry Carpenter... [et al. ]
by
Carpenter, Larry
Publication details:
New York
Oracle Press/McGraw-Hill
c2009
Availability:
No items available.
112.
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Nodia
Pearson
2009
Availability:
No items available.
113.
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
No items available.
114.
Security in computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
by
Pfleeger, Charles P
Pfleeger, Shari Lawrence
Edition:
4th ed
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2007
Availability:
No items available.
115.
The world beyond digital rights management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
2009
Availability:
No items available.
116.
The world beyond digital rights management
Jude C. Umeh
by
Umeh, Jude C
Publication details:
Swindon, UK
BCS
2009
Availability:
No items available.
Pages
Find us on the map
Powered by
Koha