Torthaí cuardaigh

  1. 1

    Information assurance for the entrerprise : a roadmap to information security / de réir Schou, Corey

    Foilsithe / Cruthaithe 2007
    LEABHAR
  2. 2

    The Data Protection Act : a practical guide / de réir Sizer, Richard

    Foilsithe / Cruthaithe 1984
    LEABHAR
  3. 3

    Information security applications : 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 revised selected papers /

    Foilsithe / Cruthaithe 2006
    LEABHAR
  4. 4

    Information assurance for the enterprise : a roadmap to information security / de réir Schou, Corey

    Foilsithe / Cruthaithe 2007
    LEABHAR
  5. 5

    Security Informatics de réir Yang, Christopher C.

    Foilsithe / Cruthaithe 2010
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  6. 6

    The Future of Identity in the Information Society de réir Rannenberg, Kai

    Foilsithe / Cruthaithe 2009
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  7. 7

    I contenuti digitali tecnologie, diritti e libert / de réir Lucchi, Nicola

    Foilsithe / Cruthaithe 2010
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  8. 8

    The economic costs and implications of high-technology hardware theft de réir Dertouzos, James N., 1950-

    Foilsithe / Cruthaithe 1999
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  9. 9

    Protection of workers' personal data

    Foilsithe / Cruthaithe 1997
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  10. 10

    Technology and privacy the new landscape /

    Foilsithe / Cruthaithe 1997
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  11. 11

    Data privacy in the information age de réir Klosek, Jacqueline, 1972-

    Foilsithe / Cruthaithe 2000
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  12. 12

    Crackproof your software the best ways to protect your software against crackers / de réir C̆ervĕn, Pavol

    Foilsithe / Cruthaithe 2002
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  13. 13

    For the record protecting electronic health information /

    Foilsithe / Cruthaithe 1997
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  14. 14
  15. 15
  16. 16

    Getting started with HIPAA de réir Pabrai, Uday O.

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  17. 17

    Disaster recovery planning de réir Sandhu, Roopendra Jeet

    Foilsithe / Cruthaithe 2002
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  18. 18

    Black hat physical device security exploiting hardware and software / de réir Miller, Drew

    Foilsithe / Cruthaithe 2005
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  19. 19

    Privacy protection and computer forensics de réir Caloyannides, Michael A.

    Foilsithe / Cruthaithe 2004
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  20. 20