Active filters
Displaying 1-50 of 68 results
Electronic health records and medical big data : law and policy / Sharona Hoffman, Case Western Reserve University School of Law.
Text
New York, NY : Cambridge University Press, 2016.
2016
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberKF3827.R4 H64 2016 | Item locationOff-site |
E-health, privacy, and security law / editor-in-chief W. Andrew H. Gantt III, Cooley LLP Washington DC.
Text
Arlington, VA. : Bloomberg, BNA Books, [2016]
2016
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberKF3827.R4 E34 2016 | Item locationOff-site |
A guide to HIPAA security and the law / Stephen S. Wu.
Text
Chicago, Illinois : American Bar Association, Section of Science & Technology Law, [2016]
2016
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberKF3827.R4 G85 2016 | Item locationOff-site |
User authentication / compiled by Terry Plum, Richard Bleiler.
Text
Washington, DC : Association of Research Libraries, Office of Leadership and Management Services, [2001], ©2001.
2001-2001
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberZ678.9.A4 U687 2001g | Item locationOff-site |
Who owns information? : from privacy to public access / Anne Wells Branscomb.
Text
New York, NY : Basic Books, [1994], ©1994.
1994-1994
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberKF2979 .B67 1994 | Item locationOff-site |
For the record : protecting electronic health information / Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Computer Science and Telecommmunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.
Text
Washington, D.C. : National Academy Press, 1997.
1997
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberR858 .F67 1997 | Item locationOff-site |
Cybercrime, cyberterrorism, and cyberwarfare : critical issues in data protection for health services information systems / [Peter Ramsaroop, Roger Stull, Roberto J. Rodrigues, Antonio Hernandez]
Text
Washington, D.C. : Pan American Health Organization, 2003.
2003
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberR859.7.S42 R36 2003 | Item locationOff-site |
Integrated circuit health data cards (smart cards) : a primer for health professionals / [Otto Rienhoff ; contributors, Roberto J. Rodrigues ... et al.].
Text
Washington, D.C. : Technology and Health Services Delivery, Health Services Organization Unit (THS/OS), Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, c2003.
2003
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberR864 .R54 2003 | Item locationOff-site |
Guide to HIPAA security and the law / Stephen S. Wu, editor.
Text
[Chicago] : ABA Section of Science & Technology Law, [2007], ©2007.
2007-2007
2 items
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberKF3827.R4 G85 2007 | Item locationOff-site |
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call number | Item locationOff-site |
Not available - Please for assistance.
Understanding computer crime / by Norman R. Lyons.
Text
Sherman Oaks, CA : Alfred Pub. Co., c1984.
1984
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHV6773 .L96 1984 | Item locationOff-site |
Sicherheitsstrategien in der Informationsverarbeitung : ein wissensbasiertes, objektorientiertes System für die Risikoanalyse / Dirk Stelzer ; mit einem Geleitwort von Paul Schmitz.
Text
Wiesbaden : Deutscher Universitäts Verlag, c1993.
1993
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHF5548.37 .S74 1993 | Item locationOff-site |
Standards for security and privacy of criminal justice information / submitted by SEARCH Group, Inc.
Text
Sacramento, Calif. : The Group, 1978, c1977.
1978-1977
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberUS 986.4 SEA | Item locationOff-site |
Secrets of a super hacker / by the Knightmare ; [introduction by Gareth Branwyn ; illustrations by Dan Wend].
Text
Port Townsend, Wash. : Loompanics Unlimited, c1994.
1994
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 K62 1994 | Item locationOff-site |
Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.
Text
New York : Simon & Schuster, 1995.
1995
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 H34 1995x | Item locationOff-site |
Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford.
Text
Bonn, [Germany] ; Sebastopol [CA] : O'Reilly & Associates, 1996.
1996
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberTK5105.59 .G38 1996 | Item locationOff-site |
Security issues for the Internet and the World Wide Web / Debra Cameron.
Text
Charleston, SC : Computer Technology Research Corp., 1996.
1996
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 C363 1996 | Item locationOff-site |
Technology and privacy : the new landscape / edited by Philip E. Agre and Marc Rotenberg.
Text
Cambridge, Mass. : MIT Press, c1997.
1997
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 T43 1997 | Item locationOff-site |
Security in computing / Charles P. Pfleeger.
Text
Upper Saddle River, NJ : Prentice Hall PTR, c1997.
1997
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 P45 1997 | Item locationOff-site |
Protecting networks with SATAN / Martin Freiss.
Text
Sebastopol, CA : O'Reilly, c1998.
1998
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5105.59 .F73 1998 | Item locationOff-site |
La sécurité informatique entre technique et droit / Joël Hubin, Yves Poullet ; avec la collaboration de Bruno Lejeune, Paul van Houtte.
Text
Namur : Centre de recherches informatique et droit, c1998.
1998
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberBEL 955.6 HUB56 1998 | Item locationOff-site |
Ru he fang fan ge ren dian nao fan zui / Gugang Kangze zhu.
Text
Taibei Shi : Lin yu wen hua shi ye you xian gong si, 2000.
2000
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 T3615 2000x | Item locationOff-site |
Delitos informáticos / Pablo Andrés Palazzi ; [Prólogo por Norberto Spolansky].
Text
Buenos Aires : Ad-Hoc, 2000.
2000
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberARG 962.5 PAL38 2000 | Item locationOff-site |
The complete guide to Internet security / Mark S. Merkow & James Breithaupt.
Text
New York : AMACOM, c2000.
2000
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberTK5105.875.I57 M465 2000 | Item locationOff-site |
Incident response : investigating computer crime / Chris Prosise & Kevin Mandia.
Text
Berkeley, Calif. ; London : Osborne/McGraw-Hill, 2001.
2001
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberHV6773 .P766 2001 | Item locationOff-site |
Networks and netwars : the future of terror, crime, and militancy / edited by John Arquilla and David Ronfeldt.
Text
Santa Monica, CA : Rand, 2001.
2001
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHV6773 .N47 2001 | Item locationOff-site |
Hacking Linux exposed : Linux security secrets & solutions / Brian Hatch, James Lee, George Kurtz.
Text
New York : Osborne/McGraw-Hill, c2001.
2001
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.76.O63 H375 2001 | Item locationOff-site |
Datenschutz im Gesundheitswesen / Herausgeber, Barbara Hürlimann, Reto Jacobs, Tomas Poledna.
Text
Zürich : Schulthess, 2001.
2001
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberKKW3119.R42 D38 2001x | Item locationOff-site |
The software vulnerability guide / Herbert H. Thompson, Scott G. Chase.
Text
Hingham, Mass. : Charles River Media, c2005.
2005
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 T475 2005 | Item locationOff-site |
Tous cybercriminels : la fin d'Internet? / Olivier Iteanu.
Text
Paris : Jacques-Marie Laffont, c2004.
2004
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberKJV333.C65 I83 2004 | Item locationOff-site |
Information technology law institute : systems security, record retention and the rise of information life cycle management / chair, Peter Brown.
Text
New York, N.Y. : Practising Law Institute, c2007.
2007
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberKF390.5.C6 I65x 2007 | Item locationOff-site |
Rechtliche Aspekte der Internetportale für Heilberufe : Zugang, Beweis, Datensicherheit / Georg Borges.
Text
Baden-Baden : Nomos, 2008.
2008
0 resources
What every librarian should know about electronic privacy / Jeannette Woodward.
Text
Westport, Conn. : Libraries Unlimited, 2007.
2007
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberZ678.93.P83 W66 2007 | Item locationOff-site |
Profilo hacker : la scienza del criminal profiling applicata al mondo dell'hacking / Raoul Chiesa, Silvio Ciappi.
Text
Milano : Apogeo, c2007.
2007
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHV | Item locationOff-site |
Architecting secure software systems / Asoke K. Talukder, Manish Chaitanya.
Text
Boca Raton : CRC Press, c2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 T34 2009 | Item locationOff-site |
Next generation SSH2 implementation : securing data in motion / Dale Liu, lead author and technical editor ; Max Caceres ... [et al.].
Text
Burlington, MA : Syngress Pub., c2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 L585 2009 | Item locationOff-site |
Leggere e scrivere i media : l'uso delle nuove tecnologie tra delega e competenza / Anna Fici ; con contributi di Gianna Cappello e Gabriella Polizzi.
Text
Milano, Italy : FrancoAngeli, c2008.
2008
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHM851 .F54 2008 | Item locationOff-site |
Cyberterrorism and information war / edited by Patrick Hess.
Text
New Dehli : Anmol Publications, c2002.
2002
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHV6431 .C93x 2002 | Item locationOff-site |
Hot och svek : säkerhet hos människor och datorer / Bengt Carlsson.
Text
Lund : Studentlitteratur, 2007
2007
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA 76.9.A2 | Item locationOff-site |
La fracture cryptographique : [insécurité numérique, nos vie privées en libre accès?] / Serge Vaudenay.
Text
Lausanne : Presses polytechniques et universitaires romandes, c2011.
2011
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 V394 2011 | Item locationOff-site |
Jarāʼim al-intirnit wa-al-blūtūth wa-al-bilāk bīrī wa-al-ibtizāz wa-al-ʻawāqib al-qānūnīyah wa-al-jazāʼīyah / taʼlīf al-Mustashār al-qānūnī Amīn Ṭāhir al-Budaywī.
Text
[al-Dammām] : Amīn Ṭāhir al-Budaywī, 1432 [2010 or 2011]
2010
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHV6773 .B83 2010 | Item locationOff-site |
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Text
Boston, Mass. : Addison-Wesley : Lucent Technologies, c2002.
2002
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 K78 2002 | Item locationOff-site |
ʻOlam avṭaḥat ha-medaʻ ṿeha-haḳing.
Text
2014
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberHeb 44711.3522 | Item locationOff-site |
Informat͡sionnoe upravlenie i bezopasnostʹ : metody, modeli, programmno-apparatnye reshenii͡a : monografii͡a / V.A. Vishni͡akov.
Text
Minsk : Izdatelʹstvo MUU, 2014.
2014
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberTK5105.8855 .V57 2014 | Item locationOff-site |
Cyber security and policy : a substantive dialogue / edited by Andrew Colarik, Julian Jang-Jaccard and Anuradha Mathrani.
Text
Auckland, NZ : Massey University Press
2017
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5105.59 | Item locationOff-site |
Protection and security on the information superhighway / Frederick B. Cohen.
Text
New York : Wiley, ©1995.
1995
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 C59 1995 | Item locationOff-site |
Disaster recovery planning : for computers and communication resources / Jon William Toigo.
Text
New York : John Wiley, ©1996.
1996
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.D348 T65 1996 | Item locationOff-site |
Global cyber security labor shortage and international business risk / [edited by] Bryan Christiansen and Agnieszka Piekarz.
Text
Hershey, PA : IGI Global, 2019.
2019
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberHD61.5 .G56 2019 | Item locationOff-site |
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.
Text
New York : Little, Brown and Company, 2017.
2017
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5105.875.I57 M58 2017 | Item locationOff-site |
Not available - Please for assistance.
Computers and security / edited by C.T. Dinardo.
Text
Montvale, N.J. : AFIPS Press, ©1978.
1978
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25xC6 | Item locationOff-site |
Security, accuracy, and privacy in computer systems.
Text
Englewood Cliffs, N.J., Prentice-Hall [1973]
1973
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberHF5548.2.M342 | Item locationOff-site |