Research Catalog

  • Electronic health records and medical big data : law and policy / Sharona Hoffman, Case Western Reserve University School of Law.

    • Text
    • New York, NY : Cambridge University Press, 2016.
    • 2016
    • 1 Item
    FormatCall NumberItem Location
    Text KF3827.R4 H64 2016Off-site
  • E-health, privacy, and security law / editor-in-chief W. Andrew H. Gantt III, Cooley LLP Washington DC.

    • Text
    • Arlington, VA. : Bloomberg, BNA Books, [2016]
    • 2016
    • 1 Item
    FormatCall NumberItem Location
    Text KF3827.R4 E34 2016Off-site
  • A guide to HIPAA security and the law / Stephen S. Wu.

    • Text
    • Chicago, Illinois : American Bar Association, Section of Science & Technology Law, [2016]
    • 2016
    • 1 Item
    FormatCall NumberItem Location
    Text KF3827.R4 G85 2016Off-site
  • User authentication / compiled by Terry Plum, Richard Bleiler.

    • Text
    • Washington, DC : Association of Research Libraries, Office of Leadership and Management Services, [2001], ©2001.
    • 2001-2001
    • 1 Item
    FormatCall NumberItem Location
    Text Z678.9.A4 U687 2001gOff-site
  • Who owns information? : from privacy to public access / Anne Wells Branscomb.

    • Text
    • New York, NY : Basic Books, [1994], ©1994.
    • 1994-1994
    • 1 Item
    FormatCall NumberItem Location
    Text KF2979 .B67 1994Off-site
  • For the record : protecting electronic health information / Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Computer Science and Telecommmunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.

    • Text
    • Washington, D.C. : National Academy Press, 1997.
    • 1997
    • 1 Item
    FormatCall NumberItem Location
    Text R858 .F67 1997Off-site
  • Cybercrime, cyberterrorism, and cyberwarfare : critical issues in data protection for health services information systems / [Peter Ramsaroop, Roger Stull, Roberto J. Rodrigues, Antonio Hernandez]

    • Text
    • 2003
    • 1 Item
    FormatCall NumberItem Location
    Text R859.7.S42 R36 2003Off-site
  • Integrated circuit health data cards (smart cards) : a primer for health professionals / [Otto Rienhoff ; contributors, Roberto J. Rodrigues ... et al.].

    • Text
    • 2003
    • 1 Item
    FormatCall NumberItem Location
    Text R864 .R54 2003Off-site
  • Guide to HIPAA security and the law / Stephen S. Wu, editor.

    • Text
    • [Chicago] : ABA Section of Science & Technology Law, [2007], ©2007.
    • 2007-2007
    • 1 Item

    Available Online

    http://www.loc.gov/catdir/toc/fy0716/2007026110.html
    FormatCall NumberItem Location
    Text KF3827.R4 G85 2007Off-site
  • Understanding computer crime / by Norman R. Lyons.

    • Text
    • Sherman Oaks, CA : Alfred Pub. Co., c1984.
    • 1984
    • 1 Item
    FormatCall NumberItem Location
    Text HV6773 .L96 1984Off-site
  • Sicherheitsstrategien in der Informationsverarbeitung : ein wissensbasiertes, objektorientiertes System für die Risikoanalyse / Dirk Stelzer ; mit einem Geleitwort von Paul Schmitz.

    • Text
    • Wiesbaden : Deutscher Universitäts Verlag, c1993.
    • 1993
    • 1 Item
    FormatCall NumberItem Location
    Text HF5548.37 .S74 1993Off-site
  • Standards for security and privacy of criminal justice information / submitted by SEARCH Group, Inc.

    • Text
    • Sacramento, Calif. : The Group, 1978, c1977.
    • 1978-1977
    • 1 Item
    FormatCall NumberItem Location
    Text US 986.4 SEAOff-site
  • Secrets of a super hacker / by the Knightmare ; [introduction by Gareth Branwyn ; illustrations by Dan Wend].

    • Text
    • Port Townsend, Wash. : Loompanics Unlimited, c1994.
    • 1994
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 K62 1994Off-site
  • Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.

    • Text
    • New York : Simon & Schuster, 1995.
    • 1995
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 H34 1995xOff-site
  • Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford.

    • Text
    • Bonn, [Germany] ; Sebastopol [CA] : O'Reilly & Associates, 1996.
    • 1996
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.59 .G38 1996Off-site
  • Security issues for the Internet and the World Wide Web / Debra Cameron.

    • Text
    • Charleston, SC : Computer Technology Research Corp., 1996.
    • 1996
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 C363 1996Off-site
  • Technology and privacy : the new landscape / edited by Philip E. Agre and Marc Rotenberg.

    • Text
    • Cambridge, Mass. : MIT Press, c1997.
    • 1997
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 T43 1997Off-site
  • Security in computing / Charles P. Pfleeger.

    • Text
    • Upper Saddle River, NJ : Prentice Hall PTR, c1997.
    • 1997
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 P45 1997Off-site
  • Protecting networks with SATAN / Martin Freiss.

    • Text
    • Sebastopol, CA : O'Reilly, c1998.
    • 1998
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.59 .F73 1998Off-site
  • La sécurité informatique entre technique et droit / Joël Hubin, Yves Poullet ; avec la collaboration de Bruno Lejeune, Paul van Houtte.

    • Text
    • Namur : Centre de recherches informatique et droit, c1998.
    • 1998
    • 1 Item
    FormatCall NumberItem Location
    Text BEL 955.6 HUB56 1998Off-site
  • Ru he fang fan ge ren dian nao fan zui / Gugang Kangze zhu.

    • Text
    • Taibei Shi : Lin yu wen hua shi ye you xian gong si, 2000.
    • 2000
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 T3615 2000xOff-site
  • Delitos informáticos / Pablo Andrés Palazzi ; [Prólogo por Norberto Spolansky].

    • Text
    • Buenos Aires : Ad-Hoc, 2000.
    • 2000
    • 1 Item
    FormatCall NumberItem Location
    Text ARG 962.5 PAL38 2000Off-site
  • The complete guide to Internet security / Mark S. Merkow & James Breithaupt.

    • Text
    • New York : AMACOM, c2000.
    • 2000
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.875.I57 M465 2000Off-site
  • Incident response : investigating computer crime / Chris Prosise & Kevin Mandia.

    • Text
    • Berkeley, Calif. ; London : Osborne/McGraw-Hill, 2001.
    • 2001
    • 1 Item
    FormatCall NumberItem Location
    Text HV6773 .P766 2001Off-site
  • Networks and netwars : the future of terror, crime, and militancy / edited by John Arquilla and David Ronfeldt.

    • Text
    • Santa Monica, CA : Rand, 2001.
    • 2001
    • 1 Item
    FormatCall NumberItem Location
    Text HV6773 .N47 2001Off-site
  • Hacking Linux exposed : Linux security secrets & solutions / Brian Hatch, James Lee, George Kurtz.

    • Text
    • New York : Osborne/McGraw-Hill, c2001.
    • 2001
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.76.O63 H375 2001Off-site
  • Datenschutz im Gesundheitswesen / Herausgeber, Barbara Hürlimann, Reto Jacobs, Tomas Poledna.

    • Text
    • Zürich : Schulthess, 2001.
    • 2001
    • 1 Item
    FormatCall NumberItem Location
    Text KKW3119.R42 D38 2001xOff-site
  • The software vulnerability guide / Herbert H. Thompson, Scott G. Chase.

    • Text
    • Hingham, Mass. : Charles River Media, c2005.
    • 2005
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 T475 2005Off-site
  • Tous cybercriminels : la fin d'Internet? / Olivier Iteanu.

    • Text
    • Paris : Jacques-Marie Laffont, c2004.
    • 2004
    • 1 Item
    FormatCall NumberItem Location
    Text KJV333.C65 I83 2004Off-site
  • Information technology law institute : systems security, record retention and the rise of information life cycle management / chair, Peter Brown.

    • Text
    • New York, N.Y. : Practising Law Institute, c2007.
    • 2007
    • 1 Item
    FormatCall NumberItem Location
    Text KF390.5.C6 I65x 2007Off-site
  • Rechtliche Aspekte der Internetportale für Heilberufe : Zugang, Beweis, Datensicherheit / Georg Borges.

    • Text
    • Baden-Baden : Nomos, 2008.
    • 2008
  • What every librarian should know about electronic privacy / Jeannette Woodward.

    • Text
    • Westport, Conn. : Libraries Unlimited, 2007.
    • 2007
    • 1 Item
    FormatCall NumberItem Location
    Text Z678.93.P83 W66 2007Off-site
  • Profilo hacker : la scienza del criminal profiling applicata al mondo dell'hacking / Raoul Chiesa, Silvio Ciappi.

    • Text
    • Milano : Apogeo, c2007.
    • 2007
    • 1 Item
  • Architecting secure software systems / Asoke K. Talukder, Manish Chaitanya.

    • Text
    • Boca Raton : CRC Press, c2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 T34 2009Off-site
  • Next generation SSH2 implementation : securing data in motion / Dale Liu, lead author and technical editor ; Max Caceres ... [et al.].

    • Text
    • Burlington, MA : Syngress Pub., c2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 L585 2009Off-site
  • Leggere e scrivere i media : l'uso delle nuove tecnologie tra delega e competenza / Anna Fici ; con contributi di Gianna Cappello e Gabriella Polizzi.

    • Text
    • Milano, Italy : FrancoAngeli, c2008.
    • 2008
    • 1 Item
    FormatCall NumberItem Location
    Text HM851 .F54 2008Off-site
  • Cyberterrorism and information war / edited by Patrick Hess.

    • Text
    • New Dehli : Anmol Publications, c2002.
    • 2002
    • 1 Item
    FormatCall NumberItem Location
    Text HV6431 .C93x 2002Off-site
  • Hot och svek : säkerhet hos människor och datorer / Bengt Carlsson.

    • Text
    • Lund : Studentlitteratur, 2007
    • 2007
    • 1 Item
    FormatCall NumberItem Location
    Text QA 76.9.A2Off-site
  • La fracture cryptographique : [insécurité numérique, nos vie privées en libre accès?] / Serge Vaudenay.

    • Text
    • Lausanne : Presses polytechniques et universitaires romandes, c2011.
    • 2011
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 V394 2011Off-site
  • Jarāʼim al-intirnit wa-al-blūtūth wa-al-bilāk bīrī wa-al-ibtizāz wa-al-ʻawāqib al-qānūnīyah wa-al-jazāʼīyah / taʼlīf al-Mustashār al-qānūnī Amīn Ṭāhir al-Budaywī.

    • Text
    • [al-Dammām] : Amīn Ṭāhir al-Budaywī, 1432 [2010 or 2011]
    • 2010
    • 1 Item
    FormatCall NumberItem Location
    Text HV6773 .B83 2010Off-site
  • Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

    • Text
    • Boston, Mass. : Addison-Wesley : Lucent Technologies, c2002.
    • 2002
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 K78 2002Off-site
  • ʻOlam avṭaḥat ha-medaʻ ṿeha-haḳing.

    • Text
    • 2014
    • 1 Item
    FormatCall NumberItem Location
    Text Heb 44711.3522Off-site
  • Informat͡sionnoe upravlenie i bezopasnostʹ : metody, modeli, programmno-apparatnye reshenii͡a : monografii͡a / V.A. Vishni͡akov.

    • Text
    • Minsk : Izdatelʹstvo MUU, 2014.
    • 2014
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.8855 .V57 2014Off-site
  • Cyber security and policy : a substantive dialogue / edited by Andrew Colarik, Julian Jang-Jaccard and Anuradha Mathrani.

    • Text
    • Auckland, NZ : Massey University Press
    • 2017
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.59Off-site
  • Protection and security on the information superhighway / Frederick B. Cohen.

    • Text
    • New York : Wiley, ©1995.
    • 1995
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 C59 1995Off-site
  • Disaster recovery planning : for computers and communication resources / Jon William Toigo.

    • Text
    • New York : John Wiley, ©1996.
    • 1996
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.D348 T65 1996Off-site
  • Global cyber security labor shortage and international business risk / [edited by] Bryan Christiansen and Agnieszka Piekarz.

    • Text
    • Hershey, PA : IGI Global, 2019.
    • 2019
    • 1 Item
    FormatCall NumberItem Location
    Text HD61.5 .G56 2019Off-site
  • The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.

    • Text
    • New York : Little, Brown and Company, 2017.
    • 2017
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.875.I57 M58 2017Off-site
    Not available - Please for assistance.
  • Computers and security / edited by C.T. Dinardo.

    • Text
    • Montvale, N.J. : AFIPS Press, ©1978.
    • 1978
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25xC6Off-site
  • Security, accuracy, and privacy in computer systems.

    • Text
    • Englewood Cliffs, N.J., Prentice-Hall [1973]
    • 1973
    • 1 Item
    FormatCall NumberItem Location
    Text HF5548.2.M342Off-site

No results found from Digital Research Books Beta

Digital books for research from multiple sources world wide- all free to read, download, and keep. No Library Card is Required. Read more about the project.

digital-research-book
Explore Digital Research Books Beta