1051. Telecommunications (Security) Bill. ([2021-05-12]) Other Names: Great Britain., Parliament. Record Type: Book Extent: 1 online resource (50 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1052. Telecommunications (Security) Bill. ([2021-05-27]) Other Names: Great Britain., Parliament. Record Type: Book Extent: 1 online resource (52 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1053. Telecommunications (Security) Bill Explanatory Notes. ([2021-05-27]) Other Names: Great Britain., Parliament. Record Type: Book Extent: 1 online resource (41 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1054. Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict /: offense versus defense in real-time computer conflict. (2021) Authors: Borges, Dan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1055. The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. (©2011) Other Names: Wallace, Michael, 1960-; Webber, Larry Record Type: Book Extent: 1 online resource (vi, 440 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1056. Enforcing privacy : regulatory, legal and technological approaches /: regulatory, legal and technological approaches. (2016) Editors: Wright, David, 1948 December 10; Hert, Paul de Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1057. Edge computing : a primer /: a primer. ([2018]) Authors: Cao, Jie; Zhang, Quan; Shi, Weisong Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1058. Information and communications security : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised selected papers /: 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised selected papers. (2015) Editors: Hui, Lucas Chi-Kwong, 1964-; Qing, S. H; Shi, Elaine; Yiu, Siu Ming Other Names: ICICS (Conference), 16th Record Type: Book Extent: 1 online resource (x, 321 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1059. Open source intelligence investigation : investigation from strategy to implementation /: investigation from strategy to implementation. (2016) Editors: Akhgar, Babak; Bayerl, P. Saskia; Sampson, Fraser Record Type: Book Extent: 1 online resource (302 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1060. Edge computing -- EDGE 2018 : second international conference, held as part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings /: second international conference, held as part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings. (2018) Editors: Liu, Shijun; Tekinerdogan, Bedir, 1970-; Aoyama, Mikio; Zhang, Liang-Jie Other Names: EDGE (Conference), 2nd Record Type: Book Extent: 1 online resource (xii, 153 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗