Your search returned 25 results.

Sort
Results
Information security handbook by
  • Hunter, John M. D
Publication details: London Springer-Verlag 2001
Availability: Items available for loan: University Library (1)Call number: 004.056.53 HUN.
Data privacy and security by
  • Salomon, David []
Edition:
Publication details: New York Springer 2003
Availability: Items available for loan: University Library (1)Call number: 004.056.53 SAL.
Techniques and applications of digital watermarking and content protection by
  • Arnold, Michael
  • Schmucker, Martin Wolthusen, Stephen D
Publication details: Boston Artech House 2003
Availability: Items available for loan: University Library (1)Call number: 004.056.55 ARN.
Business guide to information security : how to protect your company's IT assets, reduce risks and understand the law by
  • Calder, Alan
Publication details: New Delhi Kogan Page 2006
Availability: Items available for loan: University Library (1)Call number: 004.056 CAL.
Digital data integrity: the evolution from passive protection to active management by
  • Little, David B
  • Farmer, Skip El-Hilali, Oussama
Publication details: Chichester John Wiley & Sons 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.3 LIT.
Information rights in practice: the non-legal professional's guide by
  • Stead, Alan
Publication details: London Facet 2008
Availability: Items available for loan: University Library (1)Call number: 342.72/73(410) STE.
Data protection governance, risk management and compliance by
  • Hill, David G
Publication details: Boca ration Taylor and Francis 2009
Availability: Items available for loan: University Library (1)Call number: 004.056 HIL.
Embedded Systems Security by
  • David, Kleidermacher
  • Kleidermacher, Mike
Publication details: Elsevier 2012
Availability: Items available for loan: University Library (1).
Unauthorized access the crisis in online privacy and security Robert H. Sloan and Richard Warner. by
  • Sloan, Robert H
  • Warner, Richard
Publication details: Boca Raton CRC Press 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.53 SLO.
Trusted computing for embedded systems by
  • Candaele, Bernard; ed
  • Soudris, Dimitrios;ed.by
  • Anagnostopoulos, Iraklis ; ed.by
Publication details: Newyork Springer international publishing 2015
Availability: Items available for loan: University Library (1)Call number: 004.031.6:004.056 CAN.
Modern cryptography primer theoretical foundations and practical applications by
  • Koscielny, Czeslaw
  • Kurkowski, Miroslaw
  • Srebrny, Marian
Publication details: New York Springer Heidelberg 2013
Availability: Items available for loan: University Library (1)Call number: 004.056.523 KOS.
Data hiding techniques in windows OS a practical approach to investigation and defense by
  • Hassan, Nihad Ahmad
  • Hijazi, Ram
Publication details: United states Syngress 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.523 HAS.
Data protection on the move current development in ICT and privacy/data protection by
  • Gutwirth, Serge ed.by
  • Leenes, Ronald ed.by
  • Hert, Paul De ed.by
Series: Law, Governance and Technology ; v. 24
Publication details: Switzerland Springer 2016
Availability: Items available for loan: University Library (1)Call number: 004.056.5 GUT.
Business continuity management system a complete framework for implementing ISO 22301 by
  • Wong, Wei Ning Zechariah
  • Shi, Jianping
Publication details: United Kingdom Koganpage 2015
Availability: Items available for loan: University Library (1)Call number: 65:005.334 WON.
Privacy's blueprint the battle to control the design of new technologies by
  • Hartzog, Woodrow
Publication details: USA Harvard university press 2018
Availability: Items available for loan: University Library (1)Call number: 621.38:004.056.5 HAR.
Privacy and power a transatlantic dialogue in the shadow of the NSA-Affair by
  • Miller, Russell A Ed.by
Publication details: New York Cambridge 2017
Availability: Items available for loan: University Library (1)Call number: 343.45 PRI.
Personal data in competition, consumer protection and intellectual property law : towards a holistic approach? by
  • Bakhoum, Mor
Series: MPI studies on intellectual property and competition law 28
Edition: 1st ed.
Publication details: Berlin springer 2018
Availability: Items available for loan: University Library (1)Call number: 343.533 BAK/P.
Data profiling and insurance law by
  • Mcgurk, Brendan
Publication details: UK Hart 2019
Availability: Items available for loan: University Library (1)Call number: 347.764(420) MCG/D.
Data protection ensuring data availability by
  • Guise, Preston de
Publication details: London CRC press 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.5 GUI/D.
Cybersecurity law by
  • Kosseff, Jeff
Publication details: New Delhi Wiley 2017
Availability: Items available for loan: University Library (1)Call number: 347.77:004 KOS/C.
Pages
University Library, CUSAT