Surveillance or security? the risks posed by new wiretapping technologies /
Gardado en:
Autor Principal: | Landau, Susan Eva |
---|---|
Autor Corporativo: | ebrary, Inc |
Formato: | Electrónico eBook |
Idioma: | inglés |
Publicado: |
Cambridge, Mass. :
MIT Press,
c2010.
|
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
Privacy on the line the politics of wiretapping and encryption /
por: Diffie, Whitfield
Publicado: (2007)
por: Diffie, Whitfield
Publicado: (2007)
Wiretapping and electronic surveillance in America, 1862-1920 /
por: Segrave, Kerry, 1944-
Publicado: (2014)
por: Segrave, Kerry, 1944-
Publicado: (2014)
Privacy on the Line : The Politics of Wiretapping and Encryption /
por: Diffie, Whitfield
Publicado: (2010)
por: Diffie, Whitfield
Publicado: (2010)
Outsourcing information security
por: Axelrod, C. Warren
Publicado: (2004)
por: Axelrod, C. Warren
Publicado: (2004)
Digital surveillance laws, security and related issues /
Publicado: (2009)
Publicado: (2009)
Cryptography's role in securing the information society
Publicado: (1996)
Publicado: (1996)
Security secrets, intruders and ID tags.
Publicado: (2003)
Publicado: (2003)
Schools under surveillance cultures of control in public education /
Publicado: (2010)
Publicado: (2010)
Surveillance in the time of insecurity
por: Monahan, Torin
Publicado: (2010)
por: Monahan, Torin
Publicado: (2010)
The Foreign Intelligence Surveillance Act and its ramifications
Publicado: (2010)
Publicado: (2010)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado: (2002)
por: Cordesman, Anthony H.
Publicado: (2002)
Convergence : illicit networks and national security in the age of globalization /
Publicado: (2013)
Publicado: (2013)
Securing information and communications systems principles, technologies, and applications /
Publicado: (2008)
Publicado: (2008)
Surveillance/society/culture /
Publicado: (2020)
Publicado: (2020)
Everyday surveillance : vigilance and visibility in postmodern life /
por: Staples, William G.
Publicado: (2014)
por: Staples, William G.
Publicado: (2014)
Secure communicating systems design, analysis, and implementation /
por: Huth, Michael, 1962-
Publicado: (2001)
por: Huth, Michael, 1962-
Publicado: (2001)
Building the Infrastructure for Cloud Security A Solutions view /
por: Yeluri, Raghu, et al.
Publicado: (2014)
por: Yeluri, Raghu, et al.
Publicado: (2014)
Renewing U.S. telecommunications research
Publicado: (2006)
Publicado: (2006)
Cryptography and network security : principles and practice /
por: Stallings, William
Publicado: (2006)
por: Stallings, William
Publicado: (2006)
Video surveillance power and privacy in everyday life /
por: Yesil, Bilge, 1973-
Publicado: (2009)
por: Yesil, Bilge, 1973-
Publicado: (2009)
Network nation inventing American telecommunications /
por: John, Richard R., 1959-
Publicado: (2010)
por: John, Richard R., 1959-
Publicado: (2010)
Emerging trends in ICT security /
Publicado: (2014)
Publicado: (2014)
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
por: Salam, Abdul
Publicado: (2015)
por: Salam, Abdul
Publicado: (2015)
Understanding bitcoin : cryptography, engineering and economics. /
por: Franco, Pedro
Publicado: (2015)
por: Franco, Pedro
Publicado: (2015)
Terrorism and the chemical infrastructure protecting people and reducing vulnerabilities /
Publicado: (2006)
Publicado: (2006)
Information technology for counterterrorism immediate actions and future possibilities /
Publicado: (2003)
Publicado: (2003)
Implementing SSH strategies for optimizing the Secure Shell /
por: Dwivedi, Himanshu
Publicado: (2004)
por: Dwivedi, Himanshu
Publicado: (2004)
Abuse of power how Cold War surveillance and secrecy policy shaped the response to 9/11 /
por: Theoharis, Athan G.
Publicado: (2011)
por: Theoharis, Athan G.
Publicado: (2011)
Science and decisions advancing risk assessment /
Publicado: (2009)
Publicado: (2009)
An introduction to TTCN-3
Publicado: (2011)
Publicado: (2011)
Review of the Department of Homeland Security's approach to risk analysis
Publicado: (2010)
Publicado: (2010)
ExamWise for CIW security professional exam 1D0-470 /
por: Bayer, Chad M.
Publicado: (2003)
por: Bayer, Chad M.
Publicado: (2003)
Privacy at risk the new government surveillance and the Fourth Amendment /
por: Slobogin, Christopher, 1951-
Publicado: (2007)
por: Slobogin, Christopher, 1951-
Publicado: (2007)
Cybersecurity today and tomorrow pay now or pay later /
Publicado: (2002)
Publicado: (2002)
PGP & GPG email for the practical paranoid /
por: Lucas, Michael, 1967-
Publicado: (2006)
por: Lucas, Michael, 1967-
Publicado: (2006)
A cyberworm that knows no boundaries
por: Porche, Isaac, 1968-
Publicado: (2011)
por: Porche, Isaac, 1968-
Publicado: (2011)
Managing risk and information security : protect to enable /
por: Harkins, Malcolm W
Publicado: (2016)
por: Harkins, Malcolm W
Publicado: (2016)
Managing Risk and Information Security Protect to Enable /
por: Harkins, Malcolm
Publicado: (2013)
por: Harkins, Malcolm
Publicado: (2013)
Use of risk analysis in computer-aided persuasion
Publicado: (2011)
Publicado: (2011)
Spying on democracy : government surveillance, corporate power, and public resistance /
por: Boghosian, Heidi
Publicado: (2013)
por: Boghosian, Heidi
Publicado: (2013)
Títulos similares
-
Privacy on the line the politics of wiretapping and encryption /
por: Diffie, Whitfield
Publicado: (2007) -
Wiretapping and electronic surveillance in America, 1862-1920 /
por: Segrave, Kerry, 1944-
Publicado: (2014) -
Privacy on the Line : The Politics of Wiretapping and Encryption /
por: Diffie, Whitfield
Publicado: (2010) -
Outsourcing information security
por: Axelrod, C. Warren
Publicado: (2004) -
Digital surveillance laws, security and related issues /
Publicado: (2009)