Data protection:governance, risk management, and compliance
Material type:
TextLanguage: English Publication details: Boca Raton Auerbach Publications 2009Description: xxv, 304p. cmISBN: - 9781439806920 (hbd)
- D65,8(B):81, P9
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | D65,8(B):81 P9 (Browse shelf(Opens below)) | Available | SL1447498 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| D65,8(B):81 P7-;1 Computer security:concepts, issues, and implementation | D65,8(B):81 P7-;1 Computer security:concepts, issues, and implementation | D65,8(B):81 P8 TD Computer security and penetration testing | D65,8(B):81 P9 Data protection:governance, risk management, and compliance | D65,8(B):81 Q0 TD Security in Ad Hoc and sensor networks | D65,8(B):81 Q1 TD Penetration tester's open source toolkit | D65,8(B):81 Q4 Software test attacks to break mobile and embedded devices |
Glossary 287-298p.; Index 299-304p.
There are no comments on this title.
Log in to your account to post a comment.
