Your search returned 5 results.

1.
Auditing cloud computing : a security and privacy guide / Ben Halpert

by Halpert, Ben.

Publication details: J. Wiley 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF5548.37 Aud (1).

2.
Cognitive hack : the new battleground in cybersecurity... the human mind / James Bone

by Bone, James.

Publication details: CRC Press 2017Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Bon (1).

3.
Future crimes : inside the digital underground and the battle for our connected world / Marc Goodman

by Goodman, Marc | BC.

Publication details: Anchor Books 2016Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Goo (1).

4.
Foong's Malaysia cyber, electronic evidence and information technology law / Foong Cheng Leong

by Foong, Cheng Leong | EMO.

Publication details: Thomson Reuters Asia Sdn Bhd. 2020Availability: Items available for loan: ELM LIBRARY (ELM)Call number: KF 5935 Foo (1).

5.
(The) security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll

by Landoll, Douglas J | EMO.

Edition: 3rd ed.Publication details: CRC Press 2021Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Lan (1).

Copyright © 2024 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha