My Library

   
Limit search to available items
132 results found. sorted by date .
Result Page   1 2 3 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-50 of 132)
1
Book
Book Cover

Regulating access and transfer of data


Lundqvist, Bjon (Law teacher)
Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2023. 2023

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE959.5.C65 L86 2023    Available
2
Book
Book Cover

A commercial law of privacy and security for the internet of things


Elvy, Stacy-Ann, 1980- author
Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  KF390.5.C6 E48 2021    Available
3
Book
Book Cover

Big data and global trade law



Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  K4305.B54 2021    Available
 Male Library  K4305.B54 2021 c.2  Available
 Female Library  K4305.B54 2021    Available
There are additional copies/volumes of this item
4
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954- author
Australia ; Boston, MA : Cengage Learning, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S55 2021    DUE 10-05-23 Billed
 Female Library  QA76.9.A25 S55 2021    Available
5
Book
Book Cover

Data protection beyond borders : transatlantic perspectives on extraterritoriality and sovereignty



Oxford, UK ; New York, NY : Hart Publishing, an imprint of Bloomsbury Publishing, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  K3264.C65 D373 2021    Available
 Male Library  K3264.C65 D373 2021 c.2  Available
 Female Library  K3264.C65 D373 2021    Available
There are additional copies/volumes of this item
6
Book
Book Cover

GDPR : personal data protection in the European Union


Krzysztofek, Mariusz, author
Alphen aan den Rijn, The Netherlands : Wolters Kluwer, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE6071.A432016 K797 2021    Available
 Male Library  KJE6071.A432016 K797 2021 c.2  Available
 Female Library  KJE6071.A432016 K797 2021    Available
There are additional copies/volumes of this item
7
---
Book Cover

Information privacy law


Solove, Daniel J., 1972-
New York : Wolters Kluwer, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  KF1262.S66 2021    Available
 Male Library  KF1262.S66 2021 c.2  Available
 Female Library  KF1262.S66 2021    Available
There are additional copies/volumes of this item
8
---
Book Cover

Practical IoT hacking : the definitive guide to attacking the internet of things


Chantzis, Fotios
San Francisco : No Starch Press, Inc., 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.8857.C533 2021    Available
 Female Library  TK5105.8857.C533 2021    Available
9
Book
Book Cover

Privacy in the age of neuroscience : reimagining law, state and market


Grant, David (Senior fellow)
Cambridge, United Kingdom : Cambridge University Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  K3263.G73 2021    Available
10
Book
Book Cover

Private selves : legal personhood in European privacy protection


Lindroos-Hovinheimo, Susanna
Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE1624.L554 2021    Available
11
Text-Book
Book Cover

Copies

Location Call No. Status
 Female Library  K3264.C65 R54 2020 c.2  Available
 Male Library  K3264.C65 R54 2020    Available
 Male Library  K3264.C65 R54 2020 c.2  Available
There are additional copies/volumes of this item
12
Book
Book Cover

Data privacy and GDPR handbook


Sharma, Sanjay (Financial executive) author
2020

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE6071.S528 2020    Available
13
Book
Book Cover

Digital data collection and information privacy law


Burdon, Mark, 1967- author
2020

Rating:

 

Copies

Location Call No. Status
 Male Library  K3264.C65 B87 2020    Available
 Female Library  K3264.C65 B87 2020    Available
 Male Library  K3264.C65 B87 2020 c.2  Available
There are additional copies/volumes of this item
14
Book
Book Cover

The Cambridge handbook of consumer privacy



Cambridge, United Kingdom : Cambridge University Press, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Male Library  HC79.C63 C36 2020    Available
15
Book
Book Cover

Cyber risk management : prioritize threats, identify vulnerabilities and apply controls


Hodson, Christopher
London : KoganPage, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HD31.2.H637 2019    Available
 Male Library  HD31.2.H637 2019 c.2  Available
 Female Library  HD31.2.H637 2019    Available
16
Book
Book Cover

Privacy online, law and the effective regulation of online services


Betkier, Marcin
Cambridge ; Antwerp ; Chicago : Intersentia , 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  K3264.C65 B48 2019    Available
 Male Library  K3264.C65 B48 2019 c.2  Available
 Female Library  K3264.C65 B48 2019    Available
There are additional copies/volumes of this item
17
Book
Book Cover

Data protection law in the EU : roles, responsibilities and liability


Alsenoy, Brendan van
Cambridge, United Kingdom : Intersentia, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE1626.A957 2019    Available
 Male Library  KJE1626.A957 2019 c.2  Available
 Female Library  KJE1626.A957 2019    Available
There are additional copies/volumes of this item
18
Book
Book Cover

GDPR : how to achieve and maintain compliance


Foulsham, Mark, author
London ; New York : Routledge, Taylor & Francis Group, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HF5548.37.F68 2019    Available
 Male Library  HF5548.37.F68 2019 c.2  Available
 Female Library  HF5548.37.F68 2019    Available
There are additional copies/volumes of this item
19
Book
Book Cover

Data privacy law : a practical guide to the GDPR


Kennedy, G. E. (Gwen Elizabeth) 1954-
[Place of publication not identified : R.R. Bowker] , 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE6071.K46 2019    Available
 Male Library  KJE6071.K46 2019 c.2  Available
 Female Library  KJE6071.K46 2019    Available
There are additional copies/volumes of this item
20
Book
Book Cover

Guide to the GDPR



Alphen aan den Rijn : Kluwer Law International B.V., 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  KJE6071.A432016 G85 2019    Available
 Male Library  KJE6071.A432016 G85 2019 c.2  Available
 Female Library  KJE6071.A432016 G85 2019    Available
There are additional copies/volumes of this item
21
Book
Book Cover

Lawless : the secret rules that govern our digital lives


Suzor, Nicolas P., 1981-
Cambridge, United Kingdom : Cambridge University Press, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  K564.C6 S875 2019    Available
22
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River : Pearson, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S685 2018    Available
 Male Library  QA76.9.A25 S685 2018 c.2  Available
 Female Library  QA76.9.A25 S685 2018    Available
There are additional copies/volumes of this item
23
Book
Book Cover

Cyber Criminology



2018

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773.C93 2018    Available
 Male Library  HV6773.C93 2018 c.2  Available
 Female Library  HV6773.C93 2018    Available
There are additional copies/volumes of this item
24
Book
Book Cover

Cybersecurity essentials


Brooks, Charles J., author
2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.B766 2018    Available
 Female Library  TK5105.59.B766 2018    Available
25
Book
Book Cover

International cybersecurity and privacy law in practice


Tschider, Charlotte A., author
Alphen aan den Rijn, The Netherlands : Kluwer Law International B.V., 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  K3264.C65 T73 2018    Available
 Male Library  K3264.C65 T73 2018 c.2  Available
 Female Library  K3264.C65 T73 2018    Available
There are additional copies/volumes of this item
26
Book
Book Cover

Principles of information security


Whitman, Michael E., 1964-
Boston, MA : Cengage, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59 W54 2017    Available
 Female Library  TK5105.59 W54 2017    Available
27
Book
Book Cover

Security awareness : applying practical security in your world


Ciampa, Mark
Boston, Mass.: Thomson Course Technology, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C53 2017    Available
 Female Library  QA76.9.A25 C53 2017 c.2  Available
28
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954-
Boston, MA, USA : Cengage Learning, ‏2017. 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S55 2017    Available
 Male Library  QA76.9.A25 S55 2017    Available
 Male Library  QA76.9.A25 S55 2017 c.2  Available
There are additional copies/volumes of this item
29
Book
Book Cover

Defensive security handbook : best practices for securing infrastructure


Brotherston, Lee
Sebastopol, CA : O'Reilly Media, Inc., 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B7747 2017    Available
 Male Library  QA76.9.A25 B7747 2017    Available
30
Book
Book Cover

CompTIA cybersecurity analyst (CSA+) cert guide


McMillan, Troy
Indianapolis, Indiana : Pearson, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M36 2017    Available
 Male Library  QA76.9.A25 M36 2017    Available
31
Text-Book
Book Cover

Cloud computing security : foundations and challenges



Boca Raton : CRC Press/Taylor & Francis Group, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C5825 2017    Available
 Female Library  QA76.585.C5825 2017    Available
32
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S725 2017    Available
 Female Library  TK5105.59.S725 2017    Available
33
Text-Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William, author
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S713 2017 c.2  Available
 Male Library  TK5105.59.S713 2017    Available
 Female Library  TK5105.59.S713 2017    Available
There are additional copies/volumes of this item
34
Text-Book
Book Cover

Security, privacy and reliability in computer communications and networks



Gistrup, Denmark : River Publishers, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S438 2017    Available
 Female Library  TK5105.59.S438 2017    Available
35
Text-Book
Book Cover

Cybersecurity and privacy - bridging the gap



Gistrup, Denmark : River Publishers, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C934 2017    Available
 Female Library  QA76.9.A25 C934 2017    Available
36
Text-Book
Book Cover

Security in the private cloud



Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.S4435 2017    Available
 Female Library  QA76.585.S4435 2017    Available
37
Book
Book Cover

Privacy and power : a transatlantic dialogue in the shadow of the NSA-Affair



Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  K3278.P75 2017    Available
38
Book
Book Cover

The right to privacy : origins and influence of a nineteenth-century idea


Richardson, Megan
Cambridge, United Kingdom : Cambridge University Press, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  K1440.R53 2017    Available
39
Book
Book Cover

Principles of information security


Whitman, Michael E
Boston, MA : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2016    Available
40
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
41
Book
Book Cover

Digital identity management : perspectives on the technological, business and social implications



London ; New York : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD30.38 .D545 2016    Available
 Female Library  HD30.38 .D545 2016    Available
42
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
43
Book
Book Cover

African Data Privacy Laws



Cham : Springer International Publishing : Imprint: Springer, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  KQC646.A37 201    Available
 Female Library  KQC646.A37 201    Available
44
Book
Book Cover

CISSP guide to security essentials


Gregory, Peter H
Australia ; Boston, MA : Course Technology/Cengage Learning, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G7497 2015    Available
45
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Clifton Park, NY : Cengage Learning, 2015 2015

Rating:

Copies

Location Call No. Status
 Female Library  TK 5105.59 C52 2015    Available
46
Book
Book Cover

Security in computing


Pfleeger, Charles P. , 1948
1 Upper Saddle River, NJ : Prentice Hall, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P45 2015    Available
 Female Library  QA76.9.A25 P45 2015 c.2  Available
47
Book
Book Cover

The hacker playbook 2 : practical guide to penetration testing


Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K56 2015    Available
 Female Library  QA76.9.A25 K56 2015    Available
48
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
49
Text-Book
Book Cover

Case studies in secure computing : achievements and trends



Boca Raton : CRC Press/Taylor & Francis Group, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C426 2015    Available
 Female Library  QA76.9.A25 C426 2015    Available
50
Text-Book
Book Cover

Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfare



Boca Raton : CRC Press/Taylor & Francis Group, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C957 2015    Available
 Female Library  QA76.9.A25 C957 2015    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   1 2 3 Next