1-24 of 38 Books

CISSP for dummies
By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

Introduction to modern cryptography
By Jonathan Katz,Yehuda Lindell

Computer Security Basics
By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

Privacy on the line
By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau

Data & computer security
By Dennis Longley,Michael Shain
Legal protection of computer software
Legal protection of computer software
By Ranald Robertson,Michael Rhodes,Derek Simpson,Derek Stephens

Advanced security technologies in networking
By NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 Portoroz, Slovenia),Borka Jerman-Blazic,Wolfgang S. Schneider,Tomaz Klobucar,Slovenia) NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 : Portoroz

Security, rights, and liabilities in e-commerce
By Jeffrey H. Matsuura,Jeffrey, H. Matsuura

The 1988 Data Protection Act
By Rand McNally,James Mullock,Piers Leigh-Pollitt,Piers Leigh Pollitt,Osborne Clarke

12th IEEE Computer Security Foundations Workshop
By Computer Security Foundations Workshop (12th 1999 Mordano, Italy),IEEE Computer Society,Institute of Electrical and Electronics Engineers

1998 IEEE Symposium on Security and Privacy
By IEEE Symposium on Security and Privacy (19th 1998 Oakland, Calif.),IEEE Computer Society,Institute of Electrical and Electronics Engineers

Data protection implications for systems design
By Chris Hook,NCC

Tutorial computer and network security
By Marshall D. Abrams,Harold J. Podell

Audit and Control of Computer Networks
By I.J. Douglas,P.J. Olson

Intrusion Detection and Prevention
By Carl Endorf,Gene Schultz,Jim Mellander

Information Security Management Handbook on CD-ROM, 2003 Edition
By

The Cpa's Guide to Information Security
By John Graves,Kim Hill Torrence
Internet Security
Internet Security
By Judith Jeffcoate,Caroline Chappell
Encyclopedia of Data Protection 2VOL
Encyclopedia of Data Protection 2VOL
By S.N.L. Chalton,Shelagh Gaskill,I.N. Walden,L. Inger
Indigenous Data Sovereignty
Indigenous Data Sovereignty
By Tahu Kukutai