|
41.
|
Security and privacy in social networks
by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
|
|
42.
|
Spy in the coffee machine
by O'hara, Kieron | Shadbolt, Nigel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford: Oneworld Publications, 2008Availability: Items available for loan: [Call number: 323.448 OHA] (1).
|
|
43.
|
Security and privacy in mobile information and communication systems
by Schmidt, Andreas U | Lian, Shiguo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.3821028558 SCH] (1).
|
|
44.
|
Emerging pervasive information and communication technologies (PICT) : ethical challenges, opportunities and safeguards
by Pimple, Kenneth D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2014Availability: Items available for loan: [Call number: 004 PIM] (1).
|
|
45.
|
Limits of privacy
by Etzioni, Amitai. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Basic Books, 1999Availability: Items available for loan: [Call number: 323.4480973 ETZ] (1).
|
|
46.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
|
|
47.
|
Creating value with social media analytics: managing, aligning, and mining social media text, networks, actions, location, apps, hyperlinks, multimedia, & search engines data
by Khan, Gohar F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: USA: CreateSpace, Seattle, WA, 2018Availability: Items available for loan: [Call number: 302.231 KHA] (1).
|
|
48.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
49.
|
Differential privacy : from theory to practice
by Li, Ninghui | Lyu, Min | Su, Dong | Yang, Weining. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Morgan & Claypool Publishers , 2017Availability: Items available for loan: [Call number: 005.80151 LIN] (1).
|
|
50.
|
Vehicular ad hoc network security and privacy
by Lin, Xiaodong | Lu, Rongxing. Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
|
|
51.
|
Compressed sensing for privacy-preserving data processing
by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
|
|
52.
|
Framing privacy in digital collections with ethical decision making
by Dressler, Virginia [Author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: s.l. : Morgan & Claypool, 2018Availability: Items available for loan: [Call number: 323.448 DRE] (1).
|
|
53.
|
Cellular convergence and the death of privacy
by Wicker, Stephen B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Oxford University Press, 2013Availability: Items available for loan: [Call number: 342.730858 WIC] (1).
|
|
54.
|
Information theoretic security and privacy of information systems
by Schaefer, Rafael F | Boche, Holger. Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
|
|
55.
|
Crypto wars : the fight for privacy in the digital age : a political history of digital encryption
by Jarvis, Craig. Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
|
|
56.
|
Understanding bitcoin : cryptography, engineering and economics
by Franco, Pedro. Publisher: Chichester : Wiley, 2014Availability: Items available for loan: [Call number: 658.84 FRA] (1).
|
|
57.
|
Introduction to ethics in Robotics and AI
by Bartneck, Christoph | Lutge, Christoph | Wagner, Alan | Welsh, Sean. Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 601 BAR] (1).
|
|
58.
|
Cloud computing for science and engineering
by Foster, Ian | Gannon, Dennis B. Publisher: Cambridge : MIT Press, 2017Availability: Items available for loan: [Call number: 004.6782 FOS] (1).
|
|
59.
|
Privacy is hard and seven other myths : achieving privacy through careful design
by Hoepman, Jaap-Henk. Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
|
|
60.
|
Cybersecurity : the insights you need from Harvard Business Review
by Harvard Business Review. Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|