Back to Documentation Centre

COMPUTER SECURITY

PROTECTION OF THE COMPUTER HARDWARE AND SOFTWARE AS WELL AS PROTECTION OF THEIR CONTENTS AGAINST DAMAGE OR CRIMINAL MISUSE


·  B >   COMPUTERS

·  B >   DATA SECURITY

·  R >   BANK SECRECY

·  R >   COMPUTER CRIME PREVENTION MEASURES

·  R >   ELECTRONIC FUNDS TRANSFER

·  R >   SECURITY SYSTEMS

Documentation and Information Centre

Library Catalogue

Please select
Title contains Card num
Author Publisher
Series Pub. place
ISSN Pub. year
Keywords                
View   Sort by   Notes
First keyword: COMPUTER SECURITY //

45 entries found

486 COMPUTERS: CRIMES CLUES AND CONTROLS: MANAGEMENT GUIDE
495 DEATH OF PRIVACY
496 RECORDS COMPUTERS AND THE RIGHTS OF CITIZENS: REPORT
501 INFORMATION TECHNOLOGY IN A DEMOCRACY
508 COMPUTER SECURITY TECHNIQUES
1767 PROFILI PENALI DELL'INFORMATICA
1926 COMPUTER CRIME: CRIMINAL JUSTICE RESOURCE MANUAL
2218 COMPUTER CRIME AND SECURITY
4235 SICUREZZA NEI SISTEMI INFORMATIVI
4347 HOW TO PREVENT COMPUTER CRIME: GUIDE FOR MANAGERS
4636 COMPUTER AND INVASION OF PRIVACY: HEARINGS, 89TH CONGRESS, 2ND SESSION (26-28 JULY 1966)
5128 ASSAULT ON PRIVACY: COMPUTERS DATA BANKS AND DOSSIERS
7784 REATI COMMESSI CON L'USO DEL COMPUTER: BANCHE DEI DATI E TUTELA DELLA PERSONA
11602 COLLOQUE ON EUROPEAN LAW, 14TH (LISBON, 26-28 SEPTEMBER 1984): BEYOND 1984: LAW AND INFORMATION TECHNOLOGY IN TOMORROW'S SOCIETY
11877 CONGRESSO INTERNAZIONALE SUL TEMA INFORMATICA E REGOLAMENTAZIONE GIURIDICHE, 4RTO (ROMA, 16-21 MAGGIO 1988): ATTI
13672 COMPUTER CRIME IN BOMBAY: EFFORTS TO ALTER THIS PROBLEM. IN: INTERNATIONAL JOURNAL OF OFFENDER THERAPY AND COMPARATIVE CRIMINOLOGY
15136 PROBLEMS OF CRIMINAL PROCEDURAL LAW CONNECTED WITH INFORMATION TECHNOLOGY: DRAFT RECOMMENDATION NO.R(95)13 AND EXPLANATORY MEMORANDUM
16369 CYBERCRIME AND SECURITY
17005 INTIMIDAD Y SEGURIDAD
17566 INTERNET E RESPONSABILITA' GIURIDICHE
17916 PROFILO HACKER: LA SCIENZA DEL CRIMINAL PROFILING APPLICATA AL MONDO DELL'HACKING
18269 INSIDE THE SPAM CARTEL: TRADE SECRETS FROM THE DARK SIDE
18270 HACKING EXPOSED LINUX: LINUX SECURITY SECRETS AND SOLUTIONS
18273 FIGHTING TERROR ONLINE: THE CONVERGENCE OF SECURITY TECHNOLOGY AND THE LAW   [Abstract]
18296 TECHNOCRIME: TECHNOLOGY CRIME AND SOCIAL CONTROL   [Abstract]
18319 CRIME ONLINE
18468 AUSTRALIAN BUSINESS ASSESSMENT OF COMPUTER USER SECURITY: A NATIONAL SURVEY
18953 DIMENSIONE PSICOLOGICA NELLA SICUREZZA INFORMATICA: UN APPROCCIO COGNITIVO
18997 SICURI IN RETE: GUIDA PER GENITORI E INSEGNANTI ALL'USO CONSAPEVOLE DI INTERNET E DEI SOCIAL NETWORK
19109 CYBERRISQUES: REALITES ET PERSPECTIVES
19142 GESTIONE DELL'IDENTITA' DIGITALE: SCENARI E OPPORTUNITA'
19143 VIRTUALIZZAZIONE E I SUOI ASPETTI DI SICUREZZA
19144 DIMENSIONE PSICOLOGICA NELLA SICUREZZA INFORMATICA: UN APPROCCIO COGNITIVO
19145 SICUREZZA NELLE TECNOLOGIE PER LA MOBILITA'
19146 GESTIONE DELL' IDENTITA' DIGITALE: SECONDA EDIZIONE
19147 PHISHING E FURTO D'IDENTITA' DIGITALE: INDAGINI INFORMATICHE E SICUREZZA BANCARIA
19255 CYBERCRIMINALITY: FINDING A BALANCE BETWEEN FREEDOM AND SECURITY
19317 CYBER CRIME
19389 PRACTICAL METHOD FOR MINIMIZATION OF ATTACK SURFACES IN INFORMATION WARFARE. IN:POLICY BRIEF
19390 GOOD PRACTICES GUIDE ON NON NUCLEAR CRITICAL ENERGY INFRASTRUCTURE PROTECTION FROM TERRORIST ATTACKS FOCUSING IN THREATS EMANATING FROM CYBERSPACE
19391 DEVELOPING A NATIONAL STRATEGY FOR CYBERSECURITY: FOUNDATIONS FOR SECURITY GROWTH AND INNOVATION
19392 IISFA MEMBERBOOK 2013 DIGITAL FORENSICS: CONDIVISIONE DELLA CONOSCENZA TRA I MEMBRI DELL' IISFA ITALIAN CHAPTER
19424 CYBERSPACE AND NEW SECURITY: SELECTED ARTICLES
19437 IISFA MEMBERBOOK 2012 DIGITAL FORENSICS: CONDIVISIONE DELLA CONOSCENZA TRA I MEMBRI DELL' IISFA ITALIAN CHAPTER
19601 LEGAL PRINCIPLES FOR COMBATTING CYBERLAUNDERING
Contact Us Disclaimer | Acknowledgements