Ohcanbohtosat

  1. 1

    Managing information security : a program for the electronic information age / Dahkki Schweitzer, James A., 1929-

    Almmustuhtton 1982
    Girji
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    Almmustuhtton 2006
    Girji
  3. 3

    Access contested : security, identity, and resistance in Asian cyberspace /

    Almmustuhtton 2012
    Girji
  4. 4

    Check Point NG next generation security administration /

    Almmustuhtton 2002
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  5. 5
  6. 6
  7. 7

    For the record protecting electronic health information /

    Almmustuhtton 1997
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  8. 8
  9. 9

    Building DMZs for Enterprise networks

    Almmustuhtton 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  10. 10
  11. 11

    Security assessment case studies for implementing the NSA lAM / Dahkki Rogers, Russ

    Almmustuhtton 2004
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  12. 12
  13. 13

    Health data in the information age use, disclosure, and privacy /

    Almmustuhtton 1994
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  14. 14

    Getting started with HIPAA Dahkki Pabrai, Uday O.

    Almmustuhtton 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  15. 15

    Protecting data privacy in health services research

    Almmustuhtton 2000
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  16. 16
  17. 17
  18. 18

    Role-based access control Dahkki Ferraiolo, David

    Almmustuhtton 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  19. 19

    Outsourcing information security Dahkki Axelrod, C. Warren

    Almmustuhtton 2004
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji
  20. 20

    User's guide to cryptography and standards Dahkki Dent, Alexander W.

    Almmustuhtton 2005
    An electronic book accessible through the World Wide Web; click to view
    Elektrovnnalaš E-girji