|
41.
|
What every librarian should know about electronic privacy
by Woodward, Jeannette. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
|
|
42.
|
Information Assurance
by Blyth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
|
|
43.
|
Information warfare
by Ventre, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
|
|
44.
|
Foundations of security analysis and design VI : FOSAD tutorial lectures
by Aldini, Alessandro | Gorrieri, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
|
|
45.
|
Advances in artificial intelligence for privacy protection and security
by Solanas, Agusti | Mart�nez-Balleste, Antoni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
46.
|
Writing information security policies
by Barman, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
47.
|
Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers
by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
48.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
|
|
49.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
50.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
51.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
|
|
52.
|
Compressed sensing for privacy-preserving data processing
by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
|
|
53.
|
Secure networked inference with unreliable data sources
by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
|
|
54.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
55.
|
Privacy is hard and seven other myths : achieving privacy through careful design
by Hoepman, Jaap-Henk. Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
|
|
56.
|
Big breaches : cybersecurity lessons for everyone
by Daswani, Neil | Elbayadi, Moudy. Publisher: California : Apress, 2021Availability: Items available for loan: [Call number: 005.8 DAS] (1).
|