Search Results for Computer security -- Law and legislation SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bLaw$002band$002blegislation$0026ic$003dtrue$0026ps$003d300?dt=list 2024-05-31T16:57:05Z Organizational, legal, and technological dimensions of information system administration ent://SD_ILS/0/SD_ILS:841212 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Portela, Irene Maria, 1965-, editor<br/>Author&#160;Portela, Irene Maria, 1965-, editor,&#160;Almeida, Fernando, 1979-, editor<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 O74 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466645264<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:818387 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Gantz, Stephen D., editor<br/>Author&#160;Gantz, Stephen D., editor,&#160;Philpott, Daniel R., editor,&#160;Windham, Darren, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F574 2013<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597496414<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:799055 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Moore, Robert<br/>Author&#160;Moore, Robert<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 M663 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Anderson Pub.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781437755824<br/> Global perspectives in information security : legal, social, and international issues ent://SD_ILS/0/SD_ILS:287649 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Bidgoli, Hossein<br/>Author&#160;Bidgoli, Hossein<br/>Format:&#160;Books<br/>Call Number&#160;KF390.5.C6 G54 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009&#160;2008<br/>ISBN&#160;9780470372111<br/> Patriotic information systems ent://SD_ILS/0/SD_ILS:284684 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Loendorf, Todd<br/>Author&#160;Loendorf, Todd,&#160;Garson, G. David<br/>Format:&#160;Books<br/>Call Number&#160;KF390.5.C6 P37 2008<br/>Publisher&#160;IGI Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599045948<br/> What every librarian should know about electronic privacy ent://SD_ILS/0/SD_ILS:315381 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Woodward, Jeannette<br/>Author&#160;Woodward, Jeannette<br/>Format:&#160;Books<br/>Call Number&#160;Z678.93.P83 W66 2007<br/>Publisher&#160;Libraries Unlimited,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781591584896<br/> The law and economics of cybersecurity / edited by Mark F. Grady, Francesco Parisi ent://SD_ILS/0/SD_ILS:202897 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Grady, Mark F.<br/>Author&#160;Grady, Mark F.,&#160;Parisi, Francesco, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;K564.C6 L38 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521855273<br/> Data security and privacy law : combating cyberthreats ent://SD_ILS/0/SD_ILS:134216 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Cronin, Kevin P.<br/>Author&#160;Cronin, Kevin P.,&#160;Weikers, Ronald N.<br/>Format:&#160;Books<br/>Call Number&#160;KF1263.C65 C76 2006<br/>Publisher&#160;Thomson/West,<br/>Publication Date&#160;2006<br/> E-security law &amp; strategy ent://SD_ILS/0/SD_ILS:483989 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Zaid Hamzah<br/>Author&#160;Zaid Hamzah<br/>Format:&#160;Books<br/>Call Number&#160;KPG80.C65 Z34 2005<br/>Publisher&#160;Malayan Law Journal Sdn. Bhd.,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789679626322<br/> Application of WASP5 for Skudai river estuarine system ent://SD_ILS/0/SD_ILS:20570 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Chua, Lee Hwa<br/>Author&#160;Chua, Lee Hwa<br/>Format:&#160;Visual Materials<br/>Call Number&#160;CP 12148<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Master of Engineering (Civil and Environmental (Civil)) - Universiti Teknologi Malaysia, 2002<br/> Protecting yourself online : the definitive resource on safety, freedom, and privacy in cyberspace ent://SD_ILS/0/SD_ILS:794299 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Gelman, Robert B.<br/>Author&#160;Gelman, Robert B.,&#160;McCandlish, Stanton<br/>Format:&#160;Books<br/>Call Number&#160;KF390.5.C6 G45 1998<br/>Publisher&#160;Harper Edge,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780062515124<br/> Protecting intellectual property in space ent://SD_ILS/0/SD_ILS:333038 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Author&#160;Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76 A37 1985<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780818606267<br/> Cybersecurity Law ent://SD_ILS/0/SD_ILS:871987 2024-05-31T16:57:05Z 2024-05-31T16:57:05Z by&#160;Kosseff, Jeff<br/>Author&#160;Kosseff, Jeff<br/>Format:&#160;Books<br/>Call Number&#160;KF1263.C65 K67 2017<br/>ISBN&#160;9781119231509<br/>