Taking moral action
By: Contributor(s): Material type:
TextLanguage: English Series: Contemporary Social IssuesPublication details: Hoboken: Wiley-Blackwell, 2024.Description: li, 316pISBN: - 9781444335378
- R4 R4
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
South Campus Library | South Campus Library | R4 R4 (Browse shelf(Opens below)) | Available | SC1691209 |
There are no comments on this title.
Log in to your account to post a comment.
-
101
Computer Security – ESORICS 2019
by Kazue Sako, Steve Schneider, Peter Y. A. Ryan -
102
Computer Security – ESORICS 2020
by Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider -
103
Computer Security – ESORICS 2020
by Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider -
104
Computer Security – ESORICS 2021
by Elisa Bertino, Haya Shulman, Michael Waidner -
105
Computer Security – ESORICS 2021
by Elisa Bertino, Haya Shulman, Michael Waidner -
106
Computer Security – ESORICS 2022
by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng -
107
Computer Security – ESORICS 2022
by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng -
108
Computer Security – ESORICS 2022
by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng -
109
Computer security and cryptography
by Konheim Alan G -
110
Computer security and penetration testing
by Basta Alfred -
111
Computer Security and the Internet
by Paul C. van Oorschot -
112
Computer Security and the Internet
by Paul C. van Oorschot -
113
Computer security fundamentals
by Easttom Chuck -
114
Computer security handbook
by Bosworth Seymour Ed.; Kabay M E Ed.; Whyne Eric Ed. -
115
Computer security handbook
by Bosworth Seymour Ed.; Kabay M E Ed.; Whyne Eric Ed. -
116
Computer security in the 21st century
by Lee D T Ed. -
117
Computer security literacy staying safe in a digital world
by Jacobson Douglas; Idziorek Joseph -
118
Computer security management
by Parker Donn B -
119
Computer security management
by Parker Donn B -
120
Computer security protecting digital resources
by Newman Robert, C -
121
Computer security-the personnel aspect
by Souires Tony -
122
Computer security: A management guide
by Simpson Alan -
123
Computer security: Facts and figures
by Pritchard J A T -
124
Computer security: Principles and practice
by Stallings William; Brown Lawrie -
125
Computer security: Principles and practice
by Stallings William; Brown Lawrie -
126
Computer security: Principles and practice
by Stallings William -
127
Computer Security: Principles and practice
by Stallings William -
128
Computer Security: Principles and Practice, Global Edition, 4 ed.
by William Stallings, Lawrie Brown -
129
Computer security:concepts, issues, and implementation
by Basta Alfred -
130
Computer security:concepts, issues, and implementation
by Basta Alfred -
131
Computer Security. ESORICS 2021 International Workshops
by Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge -
132
Computer system and network security
by White Gregory B Ed. -
133
Computer-security technology
by Cooper J A -
134
Contemporary cryptography
by Oppliger Rolf -
135
Contemporary cryptography
by Oppliger Rolf -
136
Control and Security of E-commerce
by Smith Gordon E -
137
Core software security: Security at the source
by Ransome James; Misra Anmol -
138
Corporate Computer Security, 4e
by Boyle -
139
Crptography and network security
by Forouzan Behrouz A -
140
Crptography and network security
by Kahate Atul -
141
Cryptanalysis of RSA and its variants
by Hinek M Jason -
142
Cryptographic and information security: Approaches for images and videos
by Ramakrishnan S Ed. -
143
Cryptographic techniqes for enhancing the data security Shikha Gupta
by Gupta Shikha Au. -
144
Cryptography and data security
by Denning Dorothy Elizabeth Robling -
145
Cryptography and network security
by De Alencar, Marcelo Sampaio -
146
Cryptography and network security
by Forouzan Behrouz A; Mukhopadhyay Debdeep -
147
Cryptography and network security
by Forouzan Behrouz A; Mukhopadhyay Debdeep -
148
Cryptography and network security
by Kahate Atul -
149
Cryptography and network security
by Kahate Atul -
150
Cryptography and network security
by Kahate Atul
Taking moral action
APA
Huff C., Furchert A., . (2024). Taking moral action. Hoboken: Wiley-Blackwell.
Chicago
Huff Chuck, Furchert Almut, . 2024. Taking moral action. Hoboken: Wiley-Blackwell.
Harvard
Huff C., Furchert A., . (2024). Taking moral action. Hoboken: Wiley-Blackwell.
MLA
Huff Chuck, Furchert Almut, . Taking moral action. Hoboken: Wiley-Blackwell. 2024.
