1231. You can stop stupid : stopping losses from accidental and malicious actions /: stopping losses from accidental and malicious actions. (2020) Authors: Winkler, Ira; Brown, Tracy Celaya Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1232. Information security and optimization. (2020) Editors: Tanwar, Rohit; Choudhury, Tanupriya; Zamani, Mazdak; Gupta, Sunil, 1979- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1233. Record Re-Identification of Swapped Numerical Microdata. Issue 1 (2nd January 2017) Authors: Muralidhar, Krishnamurty Journal: Journal of information privacy & security Issue: Volume 13:Issue 1(2017) Page Start: 34 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1234. Does privacy matter to millennials? The case for personal cloud. Issue 1 (2nd January 2017) Authors: Moqbel, Murad; Bartelt, Valerie; Al-Suqri, Mohammed; Al-Maskari, Azzah Journal: Journal of information privacy & security Issue: Volume 13:Issue 1(2017) Page Start: 17 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1235. Thinking with Data: How to Turn Information into Insights, by Max Shron: (January 2014). United States of America: O'Reilly Media, Inc., 94 pp. Issue 1 (2nd January 2017) Authors: Arslan, Faruk Journal: Journal of information privacy & security Issue: Volume 13:Issue 1(2017) Page Start: 46 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1236. Editorial. Issue 1 (2nd January 2017) Authors: Bagchi, Kallol; Changchit, Chuleeporn Journal: Journal of information privacy & security Issue: Volume 13:Issue 1(2017) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1237. An examination of an e-authentication service as an intervention in e-mail risk perception. Issue 1 (2nd January 2017) Authors: Chen, Rui; Wang, Jingguo; Herath, Tejaswini; Rao, H. R. Journal: Journal of information privacy & security Issue: Volume 13:Issue 1(2017) Page Start: 2 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1238. Introduction to modern cryptography. (2014) Authors: Katz, Jonathan, 1974-; Lindell, Yehuda Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1239. Trustworthy hardware design : combinational logic locking techniques /: combinational logic locking techniques. ([2020]) Authors: Yāsīn, Muḥammad; Rajenn, Jeyavijayan (JV); Sinanoglu, Ozgur Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1240. Beginning security with Microsoft technologies : protecting Office 365, devices, and data /: protecting Office 365, devices, and data. (2019) Other Names: Lakshmi, Vasantha Record Type: Book Extent: 1 online resource (244 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗