Refine your search
Availability
-
Authors
- Philip S. Yu, Jeffrey J. P. Tsai
- Amoroso, Edward G.
- Arnold, Michael
- Babiak, Jan, Butters, J, Doll, M.W
- Bertino, Elisa
- Bossomaier, Terry R. J.
- Bradbury, R. H.
- Caloyannides, Michael A.
- Chapple, Mike
- Charlesworth, Andrew
- Danesh, Arman
- Denning, Dorothy Elizabeth Robling
- Farmer, Skip
- Jajodia, Sushil
- Katzenbeisser, Stefan
- Kaushik, Sanjay Kapoor, Shammi Diwan, Parag
- Kohl, Uta
- Krause, Micki
- Layton, Timothy P.
- Little, David B.
- Mahboob, Athar
- Margulies, Jonathan
- Martino, Lorenzo
- Mehrassa, Ali
- Moore, Andrew
- Nestler, Vincent J.
- Newman, Robert C.
- Oswald, Elisabeth
- Park, Jong Hyuk
- Petitcolas, Fabien A. P.
- Pfleeger, Charles P.
- Pfleeger, Shari Lawrence
- Porta, Thomas La
- Pounder, Chris.Dr Kosten, Freddy
- Salomon, D.
- Schmucker, Martin
- Shema, Mike
- Smith, Martin R.
- Solomon, Michael G.
- Squicciarini, Anna
- Stallings, William
- Tipton, Harold F.
- Trzeciak, Randall
- Tynan, Dan
- Virtue, Timothy M.
- Wallace, Michael
- Webber, Larry
- Zeltser, Lenny
- Show more
- Show less
-
Holding libraries
-
Home libraries
-
Item types
-
Locations
-
Series
- Advances in Information Security
- Artech House computer security series
- Artech House computing library
- HackNotes
- IEEE Press series on information & communication n...
- Jones & Bartlett Learning information systems secu...
- Lecture notes in computer science
- Prentice Hall series in computer networking and di...
- Springer professional computing
- The Sei series in software engineering
- Show more
- Show less
-
Places
-
Topics
- 1.Computer security.2.Data protection.3.Privacy, R...
- Artificial intelligence
- Artificial Intelligence (incl. Robotics)
- Business
- Business enterprises
- Business Information Systems
- Computer Communication Networks
- Computer crimes
- Computer networks
- Computer Science
- Computer science
- Computer security
- Computers
- COMPUTERS / Certification Guides / General
- Cryptography
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Data security
- Data structures (Computer science)
- Data Structures, Cryptology and Information Theory
- Database management
- Database security
- Dataskydd
- Datas�kerhet
- Datensicherung
- Digital watermarking
- Electronic commerce
- Emergency management
- Firewalls (Computer security)
- Forensic sciences
- Information storage and retrieval systems
- Information systems
- Information technology
- Informationssystem
- Internet
- IT-s䫥rhet
- IT-s�kerhet
- Kryptering
- LAW / General
- Management information systems
- MCE
- PRIVACY RIGHT. DATA PROTECTION. COMPUTER SECURITY
- Privacy, Right of
- Systems and Data Security
- Show more
- Show less
