Suggested Topics within your search.
Suggested Topics within your search.
- Data protection
- Computer security 4
- Information networks 4
- Security measures 4
- Archives 2
- Backup processing alternatives 2
- Computer networks 2
- Conservation and restoration 2
- Copyright and electronic data processing 2
- Cyberterrorism 2
- Electronic data processing 2
- Electronic records 2
- Emergency management 2
- Internet 2
- Law and legislation 2
- Libraries 2
- Library information networks 2
- Planning 2
- Prevention 2
- Safety measures 2
- Social aspects 2
-
1
Configuring the networked self law, code, and the play of everyday practice /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Configuring the networked self law, code, and the play of everyday practice /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Protecting your library's digital sources the essential guide to planning and preservation /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Protecting your library's digital sources the essential guide to planning and preservation /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook