Privacy & Data Protection

Sort these publications by...

Results Found

Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains

NewPort Cybersecurity: Securing Critical Information Infrastructures and Supply Chains

  • Author: Polemi, Nineta

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Cyber Survival Manual: From Identity Theft to the Digital Apocalypse and Everything in Between

Cyber Survival Manual: From Identity Theft to the Digital Apocalypse and Everything in Between

  • Author: Selby, Nick Vescent, Heather ...

In Stock: 3 - 5 days Availability help (opens in new window)

Differential Privacy and Applications

Differential Privacy and Applications

  • Author: Zhu, Tianqing Zhou, Wanlei ...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Locking the Cookie Jar: How to Protect Against Embezzlement, Identity Theft, and Hackers

Locking the Cookie Jar: How to Protect Against Embezzlement, Identity Theft, and Hackers

  • Author: Alvord, R Scott

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Computer and Network Security Essentials

Computer and Network Security Essentials

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Zen Oder Die Kunst, Seine Privatsphare Zu Schutzen

Zen Oder Die Kunst, Seine Privatsphare Zu Schutzen

  • Author: Glutsch, Jens

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

  • Author: Schroeder, Jordan

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Computer and Information Security Handbook

Computer and Information Security Handbook

  • Author: Vacca, John R.

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)