Limit search to available items
Result Page   1 2 Next
Save marked records Save all on page
SUBJECTS (1-50 of 51)
Data Protection
1
Mark
  Advanced Research on Electronic Commerce, Web Application, and Communication International Conferenc
Shen, Gang.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
2
Mark
  Advances in Cryptology - ASIACRYPT 2011 : 17th International Conference on the Theory and Applicatio
Lee, Dong Hoon.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
3
Mark
  Advances in Information and Computer Security : 6th International Workshop, IWSEC 2011, Tokyo, Japan
Iwata, Tetsu.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
4
Mark
  Applied information security a hands-on approach
Basin, David.
Heidelberg ; New York : Springer, c2011. -Access this resource online
c2011
EBOOKS
5
Mark
  Autonomic and Trusted Computing : 8th International Conference, ATC 2011, Banff, Canada, September 2
Calero, Jose M. Alcaraz.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
6
Mark
  B2B and beyond : new business models built on trust
DeMaio, Harry B.
New York : John Wiley and Sobs, Inc., 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  658.0558 DEM  4 WEEK LOAN  AVAILABLE
7
Mark
  Business continuity management system : a complete framework for implementing ISO 22301
Wong, Wei Ning Zechariah.
London ; Philadelphia : Kogan Page, 2015. -Access this resource online
2015
EBOOKS
8
Mark
  Computer forensics and privacy
Caloyannides, Michael A.
Boston, Mass. ; London : Artech House, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  363.2502854 CAL  4 WEEK LOAN  AVAILABLE
9
Mark
  Computer networks 18th conference, CN 2011, Ustróń, Poland, June 14-18, 2011 proceedings
Kwiecien, Andrzej.
Berlin : Springer / [2011] -Access this resource online
2011
EBOOKS
10
Mark
  Critical infrastructure protection V 5th IFIP WG 11.10 International Conference on Critical Infrastr
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (5th : 2011 : Hanover, N.H.)
Heidelberg : Springer, [2011] -Access this resource online
2011
EBOOKS
11
Mark
  Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15,
Chen, Liqun.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
12
Mark
  Cryptology and Network Security : 10th International Conference, CANS 2011, Sanya, China, December 1
Lin, Dongdai.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
13
Mark
  Data governance : how to design, deploy, and sustain an effective data governance program
Ladley, John.
Waltham, MA : Morgan Kaufmann, c2012. -Access this resource online
c2012
EBOOKS
14
Mark
  Data protection : specification for a personal information management system.
British Standards Institution.
London : British Standards Institution, 2009.  
2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  NOT FOR LOAN  LIB USE ONLY
15
Mark
  Database anonymization : privacy models, data utility, and microaggregation-based inter-model connec
Domingo-Ferrer, Josep.
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2016. -Access this resource online
2016
EBOOKS
16
Mark
  Decision and Game Theory for Security : Second International Conference, GameSec 2011, College Park,
Baras, John S.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
17
Mark
  Dependable and historic computing : essays dedicated to Brian Randell on the occasion of his 75th bi
Jones, Cliff B.
Heidelberg : Springer, [2011] -Access this resource online
2011
EBOOKS
18
Mark
  Digital copyright protection.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1997.  
1997
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 W3  8 WEEK LOAN  AVAILABLE
19
Mark
  Digital identity
Windley, Phillip J., 1958-
Sebastopol, Calif. : O'Reilly, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 W7  8 WEEK LOAN  AVAILABLE
20
Mark
  Engaging privacy and information technology in a digital age

Washington, D.C. : National Academies Press, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 WAL  4 WEEK LOAN  AVAILABLE
21
Mark
  Engineering information security : the application of systems engineering concepts to achieve inform
Jacobs, Stuart.
Hoboken, N.J. : Wiley : IEEE Press, c2011. -Access this resource online
c2011
EBOOKS
22
Mark
  Expert Oracle and Java security programming secure Oracle database applications with Java
Coffin, David.
[New York] : Apress, c2011. -Access this resource online
c2011
EBOOKS
23
Mark
  Foundations of security analysis and design VI : FOSAD tutorial lectures
International School on Foundations of Security Analysis and Design (2010 : Bertinoro, Italy)
Berlin : Springer, c2011. -Access this resource online
c2011
EBOOKS
24
Mark
  The Future of Identity in the Information Society
Rannenberg, Kai.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. -Access this resource online
2009
EBOOKS
25
Mark
  Hacking exposed : network security secrets and solutions
McClure, Stuart.
Berkeley, Calif. : Osborne, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 MCC  4 WEEK LOAN  AVAILABLE
26
Mark
  Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China,
Qing, Sihan.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
27
Mark
  Information Security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. P
Lai, Xuejia.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
28
Mark
  Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China,
Lai, Xuejia.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011. -Access this resource online
2011
EBOOKS
29
Mark
  Internet and surveillance : the challenges of Web 2.0 and social media

New York ; London : Routledge, 2012.  
2012
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HM 851 I6  4 WEEK LOAN  AVAILABLE
30
Mark
  Internet and surveillance the challenges of Web 2.0 and social media

New York ; London : Routledge, 2012. -Access this resource online
2012
EBOOKS
31
Mark
  Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013. -Access this resource online
2013
EBOOKS
32
Mark
  Managing privacy through accountability

Houndmills, Basingstoke ; New York, NY : Palgrave Macmillan, 2012. -Access this resource online
2012
EBOOKS
33
Mark
  Managing the human factor in information security : how to win over staff and influence business man
Lacey, David.
Chichester : Wiley, c2009. -Access this resource online
c2009
EBOOKS
34
Mark
  The Palgrave Handbook of International Cybercrime and Cyberdeviance.
Holt, Thomas J.
Cham : Springer International Publishing AG, 2020. -Access this resource online
2020
EBOOKS
35
Mark
  Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, Chin
PDCN 2010 (2010 : Chongqing, China), creator
Heidelberg : Springer, [2011] -Access this resource online
2011
EBOOKS
36
Mark
  Physically unclonable functions (PUFs) : applications, models, and future directions
Wachsmann, Christian.
San Rafael, California : Morgan & Claypool Publishers, [2015] -Access this resource online
2015
EBOOKS
37
Mark
  Preserving privacy in data outsourcing
Foresti, Sara.
New York : Springer, c2011. -Access this resource online
c2011
EBOOKS
38
Mark
  Privacy Enhancing Technologies : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July
Fischer-Hübner, Simone.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
39
Mark
  Programming Languages and Systems : 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7,
Yang, Hongseok.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
40
Mark
  Secure destruction of confidential material : code of practice
British Standards Institution.
London : British Standards Institution, 2009.  
2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  q HF 5736 B8  NOT FOR LOAN  LIB USE ONLY
41
Mark
  Security/Mobility Politics of Movement

Manchester : Manchester University Press, 2017. -Access this resource online
2017
EBOOKS
42
Mark
  Smart Card Research and Advanced Applications : 10th IFIP WG 8.8/11.2 International Conference, CARD
Prouff, Emmanuel.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
43
Mark
  Surveillance as social sorting : privacy, risk, and digital discrimination

London : Routledge, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  JC 596 S9  8 WEEK LOAN  AVAILABLE
 BJL 4th Floor  JC 596 S9  8 WEEK LOAN  AVAILABLE
 BJL 4th Floor  JC 596 S9  8 WEEK LOAN  AVAILABLE
44
Mark
  Surveillance studies : a reader

New York : Oxford University Press, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HV 7936 T4 S9  4 WEEK LOAN  DUE 10-03-21
 BJL Reading Room 1st floor HDC  HV 7936 T4 S9  4 WEEK LOAN  AVAILABLE
45
Mark
  Surveillance studies : an overview
Lyon, David, 1948-
Cambridge ; Malden, Mass. : Polity, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  JC 596 L9  8 WEEK LOAN  AVAILABLE
 BJL 4th Floor  JC 596 L9  8 WEEK LOAN  AVAILABLE
 BJL 4th Floor  JC 596 L9  8 WEEK LOAN  AVAILABLE
Click to view copies/volumes at all libraries
46
Mark
  Technology and privacy : the new landscape

Cambridge, Mass. : MIT Press, 1997.  
1997
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 T2  8 WEEK LOAN  AVAILABLE
47
Mark
  Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 2
Theory of Cryptography Conference (8th : 2011 : Providence, R.I.) author
Heidelberg: Springer, [2011] -Access this resource online
2011
EBOOKS
48
Mark
  Transactions on Data Hiding and Multimedia Security VI
Shi, Yun Q.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
49
Mark
  Transparent user authentication biometrics, RFID and behavioural profiling
Clarke, Nathan.
London : New York : Springer, 2011. -Access this resource online
2011
EBOOKS
50
Mark
  Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 201
Chen, Liqun.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011. -Access this resource online
2011
EBOOKS
Save marked records Save all on page
Locate in results
Result Page   1 2 Next