Search again

Found: 26  Titles

Order by :    Show:   Per Page
image

image
Privacy vs. security Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan.
Author
Stalla-Bourdillon, Sophie.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image

image

image

image
The CISO evolution : business knowledge for cybersecurity executives / Matthew K. Sharp, Kyriakos P. Lambros.
Author
Sharp, Matthew K.
Published
Hoboken, New Jersey : Wiley, c2022.
Call Number
HD30.2 S45c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image
Trust management in cloud services Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya.
Author
Noor, Talal H.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
Trustworthy execution on mobile devices Amit Vasudevan, Jonathan M. McCune, James Newsome.
Author
Vasudevan, Amit.
Published
New York, NY : Springer, c2014.
Call Number
Ebook

image
Usable security usable securiy history, themes, and challenges / Stephen Weatherill.
Author
Garfinkel, Simson.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
What is computer science? an information security perspective / Daniel Page, Nigel Smart.
Author
Page, Daniel.
Published
Cham : Springer, c2014.
Call Number
Ebook

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles