Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Subject
Library
37 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Cox, I. J. (Ingemar J.)
      Format: 
      Excerpt: 
      techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to
      by 
      Speed, Tim.
      Format: 
      Excerpt: 
      latest information on how to guard against attacks and informs the IT manager of the products that can
      by 
      Winkler, J. R. (Joachim R.)
      Format: 
      Excerpt: 
      -resilience. This book details the strengths and weaknesses of securing your company's information with different
      by 
      Qian, Yi, 1962-
      Format: 
      Excerpt: 
      information technology to do business. Unfortunately, with the advent of such technology came new and complex
      by 
      Zeng, Wenjun, 1967-
      Format: 
      Excerpt: 
      -sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their
      by 
      Rogers, Russ.
      Format: 
      Excerpt: 
      technology covered in the book is both real and thought provoking. Readers can realize the threat posed by
      by 
      Stefanek, George L.
      Format: 
      Excerpt: 
      a growing concern for organizations and their information technology managers. This book draws upon
      by 
      Shinder, Debra Littlejohn, author.
      Format: 
      Excerpt: 
      : law enforcement and information technology. This book will help both IT pros and law enforcement
      by 
      Todd, Chad.
      Format: 
      Excerpt: 
      your IT security organization."--Deena Joyce, Director of Information Technology and Network Security
      by 
      Winkler, Ira.
      Format: 
      Excerpt: 
      of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible
      by 
      Maynor, David.
      Format: 
      Excerpt: 
      . * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      As the clicȟ reminds us, information is power. In this age of computer systems and technology, an