1621. Access control, security, and trust : a logical approach /: a logical approach. (2010) Other Names: Chin, Shiu-Kai; Older, Susan Record Type: Book Extent: 1 online resource (352 pages), (93 illustrations) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1622. Cyber security management : a governance, risk and compliance framework /: a governance, risk and compliance framework. (2016) Other Names: Trim, Peter R. J; Lee, Yang-Im Record Type: Book Extent: 1 online resource (262 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1623. Botnets : the killer web app /: the killer web app. (2011) Other Names: Schiller, Craig A Record Type: Book Extent: 1 online resource (480 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1624. Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg: Boston, MA, Cengage Learning, 2015, 590 pp., $149.50 (paperback), ISBN-13: 9781305391857. Issue 2 (2nd April 2016) Authors: Arslan, Faruk Journal: Journal of information privacy & security Issue: Volume 12:Issue 2(2016) Page Start: 103 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1625. Social media policies in the Department of Defense—Do they address the risk?. Issue 2 (2nd April 2016) Authors: Cole-Miller, Katherine "Suzy"; Ward, William "Doug"; Fruhling, Ann; Cooper, Kathryn Dempsey Journal: Journal of information privacy & security Issue: Volume 12:Issue 2(2016) Page Start: 93 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1626. The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior. Issue 2 (2nd April 2016) Authors: Mamonov, Stanislav; Koufaris, Marios Journal: Journal of information privacy & security Issue: Volume 12:Issue 2(2016) Page Start: 56 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1627. Twibel: A matter of Internet privacy. Issue 2 (2nd April 2016) Authors: Placid, Raymond; Wynekoop, Judy Journal: Journal of information privacy & security Issue: Volume 12:Issue 2(2016) Page Start: 84 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1628. Editorial preface. Issue 2 (2nd April 2016) Authors: Bagchi, Kallol Journal: Journal of information privacy & security Issue: Volume 12:Issue 2(2016) Page Start: 55 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1629. The impact of attitudinal factors on intention to report workplace Internet abuse. Issue 2 (2nd April 2016) Authors: Campbell, Matt; Stylianou, Antonis C.; Shropshire, Jordan Journal: Journal of information privacy & security Issue: Volume 12:Issue 2(2016) Page Start: 68 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1630. Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings /: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings. (2020) Editors: Mendelson, Avi; Nandi, Mridul Other Names: Bhasin, Shivam, 1985- Record Type: Book Extent: 1 online resource (237 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗