Ngā hua rapu

Whakamahine hua
  1. 1

    Managing information security : a program for the electronic information age / Schweitzer, James A., 1929-

    I whakaputaina 1982
    Pukapuka
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    I whakaputaina 2006
    Pukapuka
  3. 3

    Access contested : security, identity, and resistance in Asian cyberspace /

    I whakaputaina 2012
    Pukapuka
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Building DMZs for Enterprise networks

    I whakaputaina 2003
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Getting started with HIPAA Pabrai, Uday O.

    I whakaputaina 2003
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  15. 15

    Protecting data privacy in health services research

    I whakaputaina 2000
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  16. 16
  17. 17
  18. 18

    Role-based access control Ferraiolo, David

    I whakaputaina 2003
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  19. 19

    Outsourcing information security Axelrod, C. Warren

    I whakaputaina 2004
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  20. 20

    User's guide to cryptography and standards Dent, Alexander W.

    I whakaputaina 2005
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka