Search Results for Computer security -- Law and legislationSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bLaw$002band$002blegislation$0026ic$003dtrue$0026ps$003d300?dt=list2024-05-31T16:57:05ZOrganizational, legal, and technological dimensions of information system administrationent://SD_ILS/0/SD_ILS:8412122024-05-31T16:57:05Z2024-05-31T16:57:05Zby Portela, Irene Maria, 1965-, editor<br/>Author Portela, Irene Maria, 1965-, editor, Almeida, Fernando, 1979-, editor<br/>Format: Books<br/>Call Number T58.64 O74 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466645264<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:8183872024-05-31T16:57:05Z2024-05-31T16:57:05Zby Gantz, Stephen D., editor<br/>Author Gantz, Stephen D., editor, Philpott, Daniel R., editor, Windham, Darren, editor<br/>Format: Books<br/>Call Number QA76.9.A25 F574 2013<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2013<br/>ISBN 9781597496414<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:7990552024-05-31T16:57:05Z2024-05-31T16:57:05Zby Moore, Robert<br/>Author Moore, Robert<br/>Format: Books<br/>Call Number HV8079.C65 M663 2011<br/>Edition 2nd ed.<br/>Publisher Anderson Pub.,<br/>Publication Date 2011<br/>ISBN 9781437755824<br/>Global perspectives in information security : legal, social, and international issuesent://SD_ILS/0/SD_ILS:2876492024-05-31T16:57:05Z2024-05-31T16:57:05Zby Bidgoli, Hossein<br/>Author Bidgoli, Hossein<br/>Format: Books<br/>Call Number KF390.5.C6 G54 2009<br/>Publisher Wiley,<br/>Publication Date 2009 2008<br/>ISBN 9780470372111<br/>Patriotic information systemsent://SD_ILS/0/SD_ILS:2846842024-05-31T16:57:05Z2024-05-31T16:57:05Zby Loendorf, Todd<br/>Author Loendorf, Todd, Garson, G. David<br/>Format: Books<br/>Call Number KF390.5.C6 P37 2008<br/>Publisher IGI Publishing,<br/>Publication Date 2007<br/>ISBN 9781599045948<br/>What every librarian should know about electronic privacyent://SD_ILS/0/SD_ILS:3153812024-05-31T16:57:05Z2024-05-31T16:57:05Zby Woodward, Jeannette<br/>Author Woodward, Jeannette<br/>Format: Books<br/>Call Number Z678.93.P83 W66 2007<br/>Publisher Libraries Unlimited,<br/>Publication Date 2007<br/>ISBN 9781591584896<br/>The law and economics of cybersecurity / edited by Mark F. Grady, Francesco Parisient://SD_ILS/0/SD_ILS:2028972024-05-31T16:57:05Z2024-05-31T16:57:05Zby Grady, Mark F.<br/>Author Grady, Mark F., Parisi, Francesco, 1962-<br/>Format: Books<br/>Call Number K564.C6 L38 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521855273<br/>Data security and privacy law : combating cyberthreatsent://SD_ILS/0/SD_ILS:1342162024-05-31T16:57:05Z2024-05-31T16:57:05Zby Cronin, Kevin P.<br/>Author Cronin, Kevin P., Weikers, Ronald N.<br/>Format: Books<br/>Call Number KF1263.C65 C76 2006<br/>Publisher Thomson/West,<br/>Publication Date 2006<br/>E-security law & strategyent://SD_ILS/0/SD_ILS:4839892024-05-31T16:57:05Z2024-05-31T16:57:05Zby Zaid Hamzah<br/>Author Zaid Hamzah<br/>Format: Books<br/>Call Number KPG80.C65 Z34 2005<br/>Publisher Malayan Law Journal Sdn. Bhd.,<br/>Publication Date 2005<br/>ISBN 9789679626322<br/>Application of WASP5 for Skudai river estuarine systement://SD_ILS/0/SD_ILS:205702024-05-31T16:57:05Z2024-05-31T16:57:05Zby Chua, Lee Hwa<br/>Author Chua, Lee Hwa<br/>Format: Visual Materials<br/>Call Number CP 12148<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Master of Engineering (Civil and Environmental (Civil)) - Universiti Teknologi Malaysia, 2002<br/>Protecting yourself online : the definitive resource on safety, freedom, and privacy in cyberspaceent://SD_ILS/0/SD_ILS:7942992024-05-31T16:57:05Z2024-05-31T16:57:05Zby Gelman, Robert B.<br/>Author Gelman, Robert B., McCandlish, Stanton<br/>Format: Books<br/>Call Number KF390.5.C6 G45 1998<br/>Publisher Harper Edge,<br/>Publication Date 1988<br/>ISBN 9780062515124<br/>Protecting intellectual property in spaceent://SD_ILS/0/SD_ILS:3330382024-05-31T16:57:05Z2024-05-31T16:57:05Zby Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Author Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Format: Books<br/>Call Number QA76 A37 1985<br/>Publisher IEEE Computer Society,<br/>Publication Date 1985<br/>ISBN 9780818606267<br/>Cybersecurity Lawent://SD_ILS/0/SD_ILS:8719872024-05-31T16:57:05Z2024-05-31T16:57:05Zby Kosseff, Jeff<br/>Author Kosseff, Jeff<br/>Format: Books<br/>Call Number KF1263.C65 K67 2017<br/>ISBN 9781119231509<br/>