41. Security and privacy in social networks

by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
42. Spy in the coffee machine

by O'hara, Kieron | Shadbolt, Nigel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Oneworld Publications, 2008Availability: Items available for loan: [Call number: 323.448 OHA] (1).
43. Security and privacy in mobile information and communication systems

by Schmidt, Andreas U | Lian, Shiguo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.3821028558 SCH] (1).
44. Emerging pervasive information and communication technologies (PICT) : ethical challenges, opportunities and safeguards

by Pimple, Kenneth D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2014Availability: Items available for loan: [Call number: 004 PIM] (1).
45. Limits of privacy

by Etzioni, Amitai.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Basic Books, 1999Availability: Items available for loan: [Call number: 323.4480973 ETZ] (1).
46. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
47. Creating value with social media analytics: managing, aligning, and mining social media text, networks, actions, location, apps, hyperlinks, multimedia, & search engines data

by Khan, Gohar F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: USA: CreateSpace, Seattle, WA, 2018Availability: Items available for loan: [Call number: 302.231 KHA] (1).
48. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
49. Differential privacy : from theory to practice

by Li, Ninghui | Lyu, Min | Su, Dong | Yang, Weining.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Morgan & Claypool Publishers , 2017Availability: Items available for loan: [Call number: 005.80151 LIN] (1).
50. Vehicular ad hoc network security and privacy

by Lin, Xiaodong | Lu, Rongxing.

Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
51. Compressed sensing for privacy-preserving data processing

by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
52. Framing privacy in digital collections with ethical decision making

by Dressler, Virginia [Author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: s.l. : Morgan & Claypool, 2018Availability: Items available for loan: [Call number: 323.448 DRE] (1).
53. Cellular convergence and the death of privacy

by Wicker, Stephen B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Oxford University Press, 2013Availability: Items available for loan: [Call number: 342.7308​58 WIC] (1).
54. Information theoretic security and privacy of information systems

by Schaefer, Rafael F | Boche, Holger.

Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
55. Crypto wars : the fight for privacy in the digital age : a political history of digital encryption

by Jarvis, Craig.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
56. Understanding bitcoin : cryptography, engineering and economics

by Franco, Pedro.

Publisher: Chichester : Wiley, 2014Availability: Items available for loan: [Call number: 658.84 FRA] (1).
57. Introduction to ethics in Robotics and AI

by Bartneck, Christoph | Lutge, Christoph | Wagner, Alan | Welsh, Sean.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 601 BAR] (1).
58. Cloud computing for science and engineering

by Foster, Ian | Gannon, Dennis B.

Publisher: Cambridge : MIT Press, 2017Availability: Items available for loan: [Call number: 004.6782 FOS] (1).
59. Privacy is hard and seven other myths : achieving privacy through careful design

by Hoepman, Jaap-Henk.

Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
60. Cybersecurity : the insights you need from Harvard Business Review

by Harvard Business Review.

Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).

Powered by Koha