Tomeki

Explore Books on
privacy data protection

1-24 of 38 Books

View CISSP for dummies By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory
Cover of CISSP for dummies by lawrence h. miller,peter h. gregory,lawrence miller,lawrence c. miller,peter h., cisa, cissp gregory,peter gregory

CISSP for dummies

By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Computer Security Basics By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen
Cover of Computer Security Basics by deborah russell,sr. g.t gangemi,rick lehtinen

Computer Security Basics

By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

View Privacy on the line By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau
Cover of Privacy on the line by whitfield diffie,susan landau,whitfield diffie,susan landau

Privacy on the line

By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau

View Data & computer security By Dennis Longley,Michael Shain
Cover of Data & computer security by dennis longley,michael shain

Data & computer security

By Dennis Longley,Michael Shain

View Cyber Security By Helen Wong MBE
Cover of Cyber Security by helen wong mbe

Cyber Security

By Helen Wong MBE

View Legal protection of computer software By Ranald Robertson,Michael Rhodes,Derek Simpson,Derek Stephens

Legal protection of computer software

Legal protection of computer software

By Ranald Robertson,Michael Rhodes,Derek Simpson,Derek Stephens

View Advanced security technologies in networking By NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 Portoroz, Slovenia),Borka Jerman-Blazic,Wolfgang S. Schneider,Tomaz Klobucar,Slovenia) NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 : Portoroz
Cover of Advanced security technologies in networking by nato advanced networking workshop on advanced security technologies in networking (2000 portoroz, slovenia),borka jerman-blazic,wolfgang s. schneider,tomaz klobucar,slovenia) nato advanced networking workshop on advanced security technologies in networking (2000 : portoroz

Advanced security technologies in networking

By NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 Portoroz, Slovenia),Borka Jerman-Blazic,Wolfgang S. Schneider,Tomaz Klobucar,Slovenia) NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 : Portoroz

View The Huawei and Snowden Questions By Olav Lysne
Cover of The Huawei and Snowden Questions by olav lysne

The Huawei and Snowden Questions

By Olav Lysne

View Security, rights, and liabilities in e-commerce By Jeffrey H. Matsuura,Jeffrey, H. Matsuura
Cover of Security, rights, and liabilities in e-commerce by jeffrey h. matsuura,jeffrey, h. matsuura

Security, rights, and liabilities in e-commerce

By Jeffrey H. Matsuura,Jeffrey, H. Matsuura

View The 1988 Data Protection Act By Rand McNally,James Mullock,Piers Leigh-Pollitt,Piers Leigh Pollitt,Osborne Clarke
Cover of The 1988 Data Protection Act by rand mcnally,james mullock,piers leigh-pollitt,piers leigh pollitt,osborne clarke

The 1988 Data Protection Act

By Rand McNally,James Mullock,Piers Leigh-Pollitt,Piers Leigh Pollitt,Osborne Clarke

View 12th IEEE Computer Security Foundations Workshop By Computer Security Foundations Workshop (12th 1999 Mordano, Italy),IEEE Computer Society,Institute of Electrical and Electronics Engineers
Cover of 12th IEEE Computer Security Foundations Workshop by computer security foundations workshop (12th 1999 mordano, italy),ieee computer society,institute of electrical and electronics engineers

12th IEEE Computer Security Foundations Workshop

By Computer Security Foundations Workshop (12th 1999 Mordano, Italy),IEEE Computer Society,Institute of Electrical and Electronics Engineers

View 1998 IEEE Symposium on Security and Privacy By IEEE Symposium on Security and Privacy (19th 1998 Oakland, Calif.),IEEE Computer Society,Institute of Electrical and Electronics Engineers
Cover of 1998 IEEE Symposium on Security and Privacy by ieee symposium on security and privacy (19th 1998 oakland, calif.),ieee computer society,institute of electrical and electronics engineers

1998 IEEE Symposium on Security and Privacy

By IEEE Symposium on Security and Privacy (19th 1998 Oakland, Calif.),IEEE Computer Society,Institute of Electrical and Electronics Engineers

View Data protection implications for systems design By Chris Hook,NCC
Cover of Data protection implications for systems design by chris hook,ncc

Data protection implications for systems design

By Chris Hook,NCC

View Tutorial computer and network security By Marshall D. Abrams,Harold J. Podell
Cover of Tutorial computer and network security by marshall d. abrams,harold j. podell

Tutorial computer and network security

By Marshall D. Abrams,Harold J. Podell

View Audit and Control of Computer Networks By I.J. Douglas,P.J. Olson
Cover of Audit and Control of Computer Networks by i.j. douglas,p.j. olson

Audit and Control of Computer Networks

By I.J. Douglas,P.J. Olson

View BS 7799 By

BS 7799

BS 7799

By

View mCommerce Security By Kapil Raina,Anurag Harsh
Cover of mCommerce Security by kapil raina,anurag harsh

mCommerce Security

By Kapil Raina,Anurag Harsh

View Intrusion Detection and Prevention By Carl Endorf,Gene Schultz,Jim Mellander
Cover of Intrusion Detection and Prevention by carl endorf,gene schultz,jim mellander

Intrusion Detection and Prevention

By Carl Endorf,Gene Schultz,Jim Mellander

View Information Security Management Handbook on CD-ROM, 2003 Edition By
Cover of Information Security Management Handbook on CD-ROM, 2003 Edition by

Information Security Management Handbook on CD-ROM, 2003 Edition

By

View The Cpa's Guide to Information Security By John Graves,Kim Hill Torrence
Cover of The Cpa's Guide to Information Security by john graves,kim hill torrence

The Cpa's Guide to Information Security

By John Graves,Kim Hill Torrence

View Internet Security By Judith Jeffcoate,Caroline Chappell

Internet Security

Internet Security

By Judith Jeffcoate,Caroline Chappell

View Encyclopedia of Data Protection 2VOL By S.N.L. Chalton,Shelagh Gaskill,I.N. Walden,L. Inger

Encyclopedia of Data Protection 2VOL

Encyclopedia of Data Protection 2VOL

By S.N.L. Chalton,Shelagh Gaskill,I.N. Walden,L. Inger

View Indigenous Data Sovereignty By Tahu Kukutai

Indigenous Data Sovereignty

Indigenous Data Sovereignty

By Tahu Kukutai