|
|
Information security management handbook by Tipton, Harold F. Material type: Text Publication details: Boca Raton Auerbach Publications 2003Availability: Items available for reference: Not for loan (1) Call number: 658.0558 T54I.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Computer and intrusion forensics by Mohay, George. Material type: Text Publication details: Boston Artech House 2003Availability: Items available for loan: 1 Call number: 005.8 M70C.
|
|
|
|
|
|
Security in Computing by Pfleeger, C. P. Pfleeger, S.L. Material type: Text Publication details: Prentice Hall Delhi 2009Availability: Items available for loan: 2 Call number: 005.8 P47S, ...
|
|
|
|
|
|
Data protection law and practice by Jay, Rosemary. Material type: Text Publication details: London Sweet & Maxwell 2012Availability: Items available for loan: 1 Call number: 342.0858 J35D.
|
|
|
|