Skip to content
Login
Help
العربية
Print
New Search
(More Searches)
Advanced Keyword
Title
Author
Subject
Call Number
ISBN
Author and Title
Instructor
Course
Dept.
My Library
My Library
My Account
About the library
Suggest a purchase
Comments
Help Topics
Searching
Advanced Keyword Search Tips
Saving your searches
Renewals
Fee Payment
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Author
Title
Subject
Call no.
Search
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-4 of 4)
Business enterprises -- Computer networks -- Security measures
1
Digital identity management : perspectives on the technological, business and social implications
London ; New York : Routledge, Taylor & Francis Group, 2016. 2016
Rating:
Request
Copies
Location
Call No.
Status
Male Library
HD30.38 .D545 2016
Available
Female Library
HD30.38 .D545 2016
Available
2
E-commerce security : weak links, best defenses
Ghosh, Anup K
New York : John Wiley, 1998. 1998
Rating:
Request
Website
Copies
Location
Call No.
Status
Female Library
HF5548.32 .G48 1998
Available
3
GDPR : how to achieve and maintain compliance
Foulsham, Mark, author
London ; New York : Routledge, Taylor & Francis Group, 2019. 2019
Rating:
Request
Copies
Location
Call No.
Status
Male Library
HF5548.37.F68 2019
Available
Male Library
HF5548.37.F68 2019 c.2
Available
Female Library
HF5548.37.F68 2019
Available
There are additional copies/volumes of this item
4
Intranet security : stories from the trenches
McCarthy, Linda
Mountainview, Calif. : Sun Microsystems Press, 1998. 1998
Rating:
Copies
Add Marked to Bag
Add All On Page
Locate in results
Resources
More Information
Return to Browse
Limit/Sort Search