Your search returned 11 results.

Not what you expected? Check for suggestions
1.
Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings / Hsinchun Chen [and others].

by ISI 2003 (2003 : Tucson, Ariz.) | Chen, Hsinchun.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 2003Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
2.
Digital rights management : technological, economic, legal and political aspects / Eberhard Becker [and others].

by Becker, Eberhard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, ©2003Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
3.
Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005 : proceedings / Paul Kantor [and others] (eds.).

by IEEE International Conference on Intelligence and Security Informatics (2005 : Atlanta, Ga.) | Kantor, Paul B.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, ©2005Other title: IEEE International Conference on Intelligence and Security Informatics | ISI 2005.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
4.
Cybersecurity today and tomorrow : pay now or pay later / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council.

by National Research Council (U.S.). Computer Science and Telecommunications Board.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Washington, D.C. : National Academy Press, ©2002Other title: Cyber security today and tomorrow.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
5.
Who goes there? : authentication through the lens of privacy / Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors.

by Kent, Stephen T. (Stephen Thomas) | Millett, Lynette I | National Research Council (U.S.). Committee on Authentication Technologies and Their Privacy Implications.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Washington, D.C. : National Academies Press, ©2003Other title: Authentication through the lens of privacy.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
6.
Information technology for counterterrorism : immediate actions and future possibilities / Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors.

by National Research Council (U.S.). Committee on the Role of Information Technology in Responding to Terrorism | Hennessy, John L | Patterson, David A | Lin, Herbert.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Washington, D.C. : National Academies Press, ©2003Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
7.
Schneier on security / Bruce Schneier.

by Schneier, Bruce, 1963-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Pub., ©2008Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
8.
Creating a national framework for cybersecurity : an analysis of issues and options / Eric A. Fischer.

by Fischer, Eric A.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Nova Science Publishers, ©2009Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
9.
Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats.

by Wang, Cliff | King, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley & Sons, 2007Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
10.
Cybersecurity and cyberwar : what everyone needs to know / Peter W. Singer, Allan Friedman.

by Singer, P. W. (Peter Warren) | Friedman, Allan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Oxford University Press, USA, [2014]Copyright date: ©2014Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
11.
Consumer attitudes toward data breach notifications and loss of personal information / Lillian Ablon, Paul Heaton, Diana Catherine Lavery, Sasha Romanosky.

by Ablon, Lillian [author.] | Rand Corporation [publisher.] | Institute for Civil Justice (U.S.) [issuing body,, sponsoring body.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Santa Monica, Calif. : Rand Corporation, [2016]Copyright date: ©2016Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .

Powered by Koha