Explore: Data Protection
Discover books, insights, and more — all in one place.
Learn more about Data Protection with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “data-protection”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Network Security Assessment
By Chris McNab

“Network Security Assessment” Metadata:
- Title: Network Security Assessment
- Author: Chris McNab
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 478
- Publisher: ➤ O'Reilly Media, Inc. - O'Reilly Media, Incorporated - Anaya Multimedia - O'Reilly - O'Reilly Media
- Publish Date: ➤ 2004 - 2005 - 2007 - 2008 - 2016
- Publish Location: ➤ Sebastopol, CA - Cambridge - Sebastopol - Beijing
“Network Security Assessment” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Evaluation - Security measures - Computer networks, security measures - Computers, access control - Database security - Data protection - Computer security - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL23691203M - OL22133719M - OL36716419M - OL3327684M - OL36706371M - OL23399927M - OL13267854M - OL23635962M - OL36707449M - OL9513003M - OL23556906M - OL36716538M - OL26836814M
- Online Computer Library Center (OCLC) ID: 180989270 - 57059486
- Library of Congress Control Number (LCCN): 2009419532 - 2004302106
- All ISBNs: ➤ 9780596519339 - 0596510306 - 9781306816878 - 149191095X - 9780596510305 - 059600611X - 9788441517516 - 8441517517 - 0596519338 - 1306816874 - 1306817455 - 9781491910955 - 9780596520809 - 0596520808 - 9781306817455 - 9780596006112
Author's Alternative Names:
"Christopher Ross McNab" and "Christopher R. McNab"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2SAS(R) 9.1.3 Intelligence Platform
By SAS Publishing

“SAS(R) 9.1.3 Intelligence Platform” Metadata:
- Title: ➤ SAS(R) 9.1.3 Intelligence Platform
- Author: SAS Publishing
- Language: English
- Number of Pages: Median: 228
- Publisher: ➤ SAS Pub. - SAS Institute - SAS - Brand: SAS Institute
- Publish Date: 2006 - 2007
- Publish Location: Cary, NC
“SAS(R) 9.1.3 Intelligence Platform” Subjects and Themes:
- Subjects: ➤ SAS (Computer file) - Integrated software - Web servers - Application software - SAS Institute - Data structures (Computer science) - Database management - Computer security - Development - Servlets - Web site development - Management information systems - Management - Networking - Computer networks - COMPUTERS - Data protection - General - Internet - Security - Security measures - System design
Edition Identifiers:
- The Open Library ID: ➤ OL21812906M - OL20988937M - OL19968881M - OL17993805M - OL17993790M - OL17977470M - OL17993801M - OL17977475M - OL17993794M - OL17993788M - OL17993796M - OL12502666M - OL12502674M - OL12502678M - OL8902488M - OL12502681M - OL12502677M - OL12502665M - OL12502673M - OL12502676M - OL12502675M
- Online Computer Library Center (OCLC) ID: ➤ 227000261 - 225961942 - 144548800 - 144333195 - 144548804 - 144548802 - 144548803 - 144548806 - 144333171 - 144548799
- Library of Congress Control Number (LCCN): ➤ 2007275864 - 2007275858 - 2008273243 - 2007275860 - 2007275861 - 2007275859 - 2007275862 - 2007275863 - 2007275865 - 2006278738
- All ISBNs: ➤ 9781599942889 - 9781599942872 - 9781599942834 - 9781599941554 - 1599940078 - 9781599943763 - 1599942852 - 1599942860 - 1599941678 - 1599942887 - 9781599942827 - 1599942836 - 1599942879 - 159994376X - 1599942828 - 1599941554 - 9781599942865 - 9781599940076 - 9781599942858 - 9781599941677
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find SAS(R) 9.1.3 Intelligence Platform at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Hacking exposed
By Stuart McClure, Joel Scambray and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Stuart McClureJoel ScambrayGeorge Kurtz
- Language: English
- Number of Pages: Median: 484
- Publisher: Computing Mcgraw-Hill
- Publish Date: 1999
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Hacking - Computerbeveiliging - Security measures - Data protection - Computer fraud & hacking - Data security & data encryption - Network security - Reference works - Security measures - Computer security - Computer Data Security - Computers - Computers - Communications / Networking - Security - General - Computer Books And Software - Security - Networking - General - Computer Bks - Communications / Networking - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL7302141M - OL9256818M
- All ISBNs: 0072121270 - 9780072121278
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Counterterrorism and Cybersecurity
By Newton Lee

“Counterterrorism and Cybersecurity” Metadata:
- Title: ➤ Counterterrorism and Cybersecurity
- Author: Newton Lee
- Language: English
- Number of Pages: Median: 247
- Publisher: ➤ Springer-Verlag New York Inc - Springer - Springer New York - Springer International Publishing AG - Imprint: Springer
- Publish Date: 2013 - 2015 - 2016 - 2024
- Publish Location: New York, NY - New York
“Counterterrorism and Cybersecurity” Subjects and Themes:
- Subjects: ➤ Information Systems - Information Systems Applications (incl. Internet) - Computer science - Data Mining and Knowledge Discovery - Management of Computing and Information Systems - Multimedia systems - Data mining - Data protection - Terrorism, prevention - National security - Security, international - Hackers - Computer security - Computer crimes - Terrorism - Prevention - History - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL51817673M - OL37219127M - OL31011740M - OL30530274M - OL29831067M - OL28042997M - OL27966070M - OL27027692M
- Online Computer Library Center (OCLC) ID: 828487484
- Library of Congress Control Number (LCCN): 2013934718
- All ISBNs: ➤ 3319172433 - 9783319172439 - 1461472040 - 9783319172446 - 9781461472056 - 9783319374604 - 1461472059 - 9781489986733 - 3319172441 - 1461472067 - 3319374605 - 9781461472049 - 3031631250 - 9783031631252 - 9781461472063 - 1489986731
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Counterterrorism and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Software and Data Technologies
By José Cordeiro

“Software and Data Technologies” Metadata:
- Title: Software and Data Technologies
- Author: José Cordeiro
- Language: English
- Number of Pages: Median: 291
- Publisher: ➤ Brand: Springer - Springer - Springer London, Limited - Springer-Verlag Berlin Heidelberg
- Publish Date: 2009 - 2011 - 2013
- Publish Location: Berlin, Heidelberg
“Software and Data Technologies” Subjects and Themes:
- Subjects: ➤ Data protection - Data mining - Computer science - Software engineering - Data encryption (Computer science) - Computer software - Congresses - Development - Data management - Computer programming - Computer software, development - Database management - Data structures (computer science) - Computer simulation - Programming Languages, Compilers, Interpreters - Simulation and Modeling
Edition Identifiers:
- The Open Library ID: ➤ OL37236495M - OL34521600M - OL34466708M - OL28281913M - OL28148576M - OL28031897M - OL28009119M - OL27970647M - OL25573174M
- Library of Congress Control Number (LCCN): 2009936865
- All ISBNs: ➤ 9783642361784 - 9783642052002 - 3642361781 - 3642052010 - 9783642361760 - 9783642052019 - 9783642201165 - 9783642454042 - 3642201172 - 3642295797 - 9783642454035 - 3642361765 - 3642052002 - 9783642295782 - 3642201164 - 3642295789 - 3642454038 - 9783642201172 - 9783642295799 - 3642454046
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Software and Data Technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Cyber threats and information security
By Frank J. Cilluffo, Sharon L. Cardash and Michele Ledgerwood

“Cyber threats and information security” Metadata:
- Title: ➤ Cyber threats and information security
- Authors: Frank J. CilluffoSharon L. CardashMichele Ledgerwood
- Language: English
- Number of Pages: Median: 47
- Publisher: ➤ Center for Strategic & International Studies - CSIS Press
- Publish Date: 2001
- Publish Location: Washington, D.C
“Cyber threats and information security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer crimes - Security measures - Computer security - Data protection - Terrorism - Weapons of mass destruction
- Places: United States
Edition Identifiers:
- The Open Library ID: OL3937538M - OL8230019M
- Online Computer Library Center (OCLC) ID: 46670960
- Library of Congress Control Number (LCCN): 2001001207
- All ISBNs: 0892063882 - 9780892063888
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Cyber threats and information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7IT Governance
By Alan Calder and Steve Watkins

“IT Governance” Metadata:
- Title: IT Governance
- Authors: Alan CalderSteve Watkins
- Language: English
- Number of Pages: Median: 360
- Publisher: ➤ Kogan Page, Limited - IT Governance Ltd - IT Governance Publishing - Kogan Page
- Publish Date: ➤ 2005 - 2007 - 2009 - 2015 - 2019
“IT Governance” Subjects and Themes:
- Subjects: ➤ Data protection - Business enterprises, computer networks - Computer networks - COMPUTERS / Security / General - COMPUTERS / Information Technology - Business enterprises - Computer security - BUSINESS & ECONOMICS / Information Management - Security measures - BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management - Information technology - Management - Evaluation - Auditing - Standards
Edition Identifiers:
- The Open Library ID: ➤ OL50506887M - OL39577367M - OL33535395M - OL46564465M - OL27512211M - OL39580475M - OL28718195M - OL28561388M - OL28718192M - OL39575269M
- Online Computer Library Center (OCLC) ID: 912140774 - 856889493
- Library of Congress Control Number (LCCN): 2015024691
- All ISBNs: ➤ 9781905356904 - 0749496959 - 9780749496968 - 9780749474065 - 9780749476021 - 9781905356027 - 0749476028 - 9781905356911 - 1905356021 - 1905356307 - 1905356919 - 9780749496951 - 9781905356300 - 0749496967 - 074947405X - 9780749474058 - 1789660300 - 9781789660302 - 0749474068 - 1905356900
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find IT Governance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Information technology law
By Ian J. Lloyd

“Information technology law” Metadata:
- Title: Information technology law
- Author: Ian J. Lloyd
- Language: English
- Number of Pages: Median: 597
- Publisher: ➤ Butterworths - Oxford University Press - Oxford University Press, USA - Oxford University Press, Incorporated
- Publish Date: ➤ 1993 - 1997 - 2000 - 2004 - 2008 - 2014
- Publish Location: ➤ New York - Oxford [England] - Carlsbad, Calif - London
“Information technology law” Subjects and Themes:
- Subjects: ➤ Law and legislation - Computers - Data protection - Data transmission systems - Computer crimes - Telecommunication - Information technology - Computer software - Computers, law and legislation - Electronic data interchange
- Places: Great Britain
Edition Identifiers:
- The Open Library ID: ➤ OL46049393M - OL28425993M - OL22639974M - OL22543814M - OL3322386M - OL1174890M
- Online Computer Library Center (OCLC) ID: 29426015 - 214305980 - 43786485 - 56964634
- Library of Congress Control Number (LCCN): 2004276643 - 2008277171 - 94159383 - 2001339609
- All ISBNs: ➤ 9780406914897 - 9780406975782 - 9781306260619 - 1306260612 - 0199299773 - 0406024464 - 9780199299775 - 0406975787 - 9780406024466 - 0406914893 - 9780406895158 - 0406895155
Access and General Info:
- First Year Published: 1993
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Information technology law at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Hacking for Dummies
By Kevin Beaver and Jutta Schmidt

“Hacking for Dummies” Metadata:
- Title: Hacking for Dummies
- Authors: Kevin BeaverJutta Schmidt
- Languages: English - ger
- Number of Pages: Median: 396
- Publisher: ➤ For Dummies - John Wiley & Sons, Inc. - Wiley - Wiley Pub. - John Wiley & Sons, Ltd. - Wiley & Sons, Limited, John - Brand: Wiley-VCH Verlag GmbH - John Wiley & Son inc. - Wiley & Sons Canada, Limited, John - John Wiley &Sons - Wiley & Sons, Incorporated, John
- Publish Date: ➤ 2004 - 2006 - 2007 - 2009 - 2010 - 2012 - 2013 - 2015 - 2016 - 2018 - 2019 - 2020 - 2022
- Publish Location: ➤ Hoboken, NJ - New York - Chichester
“Hacking for Dummies” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer hackers - Computer networks - Computer security - Nonfiction - Security measures - Networking - Data protection - General - Internet - Security - Hackers - Computer networks, security measures - Engineering & Applied Sciences - Computer Science
Edition Identifiers:
- The Open Library ID: ➤ OL39938989M - OL39984549M - OL33467708M - OL33643196M - OL33721332M - OL33814272M - OL33835394M - OL40053258M - OL40077759M - OL33415963M - OL26961199M - OL26838501M - OL29131004M - OL29131005M - OL29304324M - OL33645424M - OL33645425M - OL34529389M - OL35584459M - OL35853272M - OL35881789M - OL39849032M - OL39856690M - OL39863911M - OL39900428M - OL40050877M - OL48632739M - OL48635334M - OL48638700M - OL26319294M - OL25353392M - OL24256462M - OL18498113M - OL24276588M - OL23072865M - OL8050918M - OL7595409M
- Online Computer Library Center (OCLC) ID: ➤ 1043392947 - 858027983 - 219607826 - 908805314 - 614432840 - 437082945
- Library of Congress Control Number (LCCN): 2006932690 - 2004101971 - 2012955723 - 2009942371 - 2018944084
- All ISBNs: ➤ 1118380932 - 9780764557842 - 9780470550939 - 3527677232 - 9781118380949 - 9781118380956 - 9781119174714 - 1283941120 - 1118380967 - 9780470602560 - 0470602562 - 1118380940 - 0470550937 - 9783527819041 - 9781118380932 - 9781119485476 - 9780470199268 - 9780470052358 - 9783527715510 - 9780470113073 - 3527805001 - 3527819045 - 1119872200 - 3527677224 - 9781119154686 - 1119872197 - 9780764573781 - 9781119872214 - 9781280649691 - 0470113073 - 9781118380963 - 3527715517 - 1119872219 - 1119485517 - 352780501X - 1119154707 - 9781119872207 - 9783527805006 - 9781119872191 - 9783527708307 - 9783527717958 - 1119485479 - 3527708308 - 9781119154693 - 9780470602683 - 0470602678 - 0470602686 - 9783527677238 - 1119485541 - 1280649690 - 9781119485513 - 1119154685 - 9781280350320 - 1280350326 - 1118380959 - 0470199261 - 3527829229 - 1119174716 - 9781283941129 - 9781119154709 - 9783527829224 - 076455784X - 0764573780 - 9783527677221 - 1119154693 - 9781119485544 - 9780470602676 - 9783527805013 - 3527717951 - 047005235X
First Setence:
"This book is about hacking ethically - the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them."
Author's Alternative Names:
"Kevin M. Beaver" and "Kevin Michael Beaver"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking for Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
By Kevin D. Mitnick

“The Art of Invisibility” Metadata:
- Title: The Art of Invisibility
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 309
- Publisher: ➤ Little, Brown and Company - Hachette Book Group USA
- Publish Date: 2017
- Publish Location: New York
“The Art of Invisibility” Subjects and Themes:
- Subjects: ➤ Personal Computers - TECHNOLOGY & ENGINEERING - Web - Social Aspects - Online Safety & Privacy - Social Media - COMPUTERS - Right of Privacy - Data protection - Mobile Devices - Hardware - Computer security - Internet - Security - Security measures - Telecommunications - Mobile & Wireless Communications - Internet, security measures - Privacy, right of
Edition Identifiers:
- The Open Library ID: OL26241338M - OL27732598M
- Online Computer Library Center (OCLC) ID: 951711109
- Library of Congress Control Number (LCCN): 2016024302
- All ISBNs: 0316554545 - 9780316380508 - 9780316554541 - 0316380504
Author's Alternative Names:
"Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "KD Mitnick", "Kevin David Mitnick" and "Kevin MITNICK"Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Invisibility at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Sozialgesetzbuch
By Germany

“Sozialgesetzbuch” Metadata:
- Title: Sozialgesetzbuch
- Author: Germany
- Language: ger
- Number of Pages: Median: 380
- Publisher: ➤ Asgard-Verlag W. Hippe - Wirtschaftsverlag Bachem - Der Bundesminister - BIH - BfA, Dezernat für Presse- und Öffentlichkeitsarbeit - Bundesversicherungsanstalt für Angestellte, Dezernat für Presse- und Öffentlichkeitsarbeit - Walhalla-Fachverlag - Deutscher Gemeindeverlag - Bundesminister für Arbeit und Sozialordnung, Referat Öffentlichkeitsarbeit - Deutscher Gemelndeverlag - Nomos - Boorberg - Beck - Walhalla Fachverlag - H. Heenemann - Die Bundesversicherungsanstalt - Bachem - Bundesversicherungsanstalt für Angestellte - Editio Cantor Verlag - E. Schmidt - Integrationsfirma Integra - Starnberger - Bundesversicherungsanstalt für Angestellte, Dezernat für Presse- und Öffentlichkeitsarbeit - Deutscher Taschenbuch Verlag - Asgard-Verlag Hippe - Leitfadenverlag Sudholt - Walhalla Fachverl. - Kohlhammer - Deutscher Taschenbuch-Verlag - Deutsche Rentenversicherung Bund, Geschäftsbereich Presse- und Öffentlichkeitsarbeit, Kommunikation - Fachverl. Haarfeld - Der Bundesminister für Arbeit und Sozialordnung, Referat Presse- und Öffentlichkeitsarbeit - Dt. Rentenversicherung - Bundesminister für Arbeit und Sozialordnung - MBO LexisNexis - C.H. Beck - Bund-Verlag - Luchterhand
- Publish Date: ➤ 1976 - 1977 - 1979 - 1981 - 1983 - 1986 - 1988 - 1989 - 1991 - 1992 - 1993 - 1994 - 1995 - 1996 - 1997 - 1998 - 1999 - 2000 - 2002 - 2003 - 2004 - 2005 - 2006 - 2007 - 2009
- Publish Location: ➤ Karlsruhe - Walldorf - Berlin-Wilmersdorf - Neuwied - Berg - Münster - Mainz - [Köln] - Baden-Baden - Köln - Berg [Germany] - Stuttgart, München [u.a.] - Essen - Regensburg - [München] - Aulendorf - Stuttgart - Darmstadt - München - Bonn - Berlin - Sankt Augustin
“Sozialgesetzbuch” Subjects and Themes:
- Subjects: ➤ Administration - Administrative procedure - Citizen participation - Data protection - Election law - Government Corporations - Health Insurance - Law and legislation - Legal status, laws - Manpower policy - National health insurance - Old age pensions - People with disabilities - Public welfare - Public welfare administration - Social legislation - Social security - Unemployed - Unemployment Insurance - Vocational rehabilitation - Workers' compensation - Sources - Public health laws
- Places: Germany - Germany (West) - West Germany
Edition Identifiers:
- The Open Library ID: ➤ OL23572772M - OL2918329M - OL6826714M - OL435266M - OL4326617M - OL759594M - OL897871M - OL549530M - OL1665107M - OL1156219M - OL16246934M - OL840531M - OL16274951M - OL23171963M - OL4636544M - OL755382M - OL3758599M - OL4333649M - OL629558M - OL23161854M - OL6839269M - OL24498775M - OL24451613M - OL3378216M - OL1046950M - OL4620338M - OL2132234M - OL1153558M - OL1522058M - OL1779830M - OL22507678M - OL4664038M - OL418914M - OL4175190M - OL484875M - OL587635M - OL1030736M - OL16247561M - OL3767346M - OL3867288M - OL4668613M - OL23648777M - OL2808224M - OL4975265M - OL6838286M - OL3269092M - OL2342107M - OL1151856M - OL16245454M - OL16271807M - OL4177514M - OL16284122M - OL3067932M - OL4982597M - OL486493M - OL18495381M - OL3824737M - OL23182715M - OL1508424M - OL418797M - OL3734220M
- Online Computer Library Center (OCLC) ID: ➤ 10273977 - 9194335 - 31738364 - 30919847 - 24960926 - 57319538 - 40459958 - 54817008 - 30545845 - 6147301 - 22243551
- Library of Congress Control Number (LCCN): ➤ 00309944 - 2006402221 - 84151009 - 76465737 - 2004365222 - 2007416703 - 82165410 - 96230611 - 96178048 - 81135395 - 2003458519 - 93209911 - 2009397258 - 2015398228 - 2010472620 - 00337424 - 83240884 - 2006436595 - 88196753 - 2009466454 - 2009397040 - 77554394 - 98122793 - 92136547 - 93189945 - 91230685 - 2012465190 - 2005419345 - 2007387908 - 00393328 - 97150864 - 85215959 - 2003397241 - 94132694 - 2009674126 - 98144156 - 98122645 - 80452710 - 95117349 - 98213622 - 84136577 - 86460023 - 2005458685 - 95189502 - 2005530056 - 94128892 - 2003488137 - 81189273 - 93247607 - 77468264 - 00335890 - 96130515 - 00416811 - 98215915 - 77451162 - 78367083 - 2004480899 - 97156162 - 94126344 - 93223077 - 78374576 - 76473528 - 80455184 - 83190959 - 77559247
- All ISBNs: ➤ 3423055596 - 3537714114 - 3802974824 - 9783802974823 - 347212136X - 3832909591 - 3406525830 - 3170018256 - 9783406418549 - 9783472121367 - 3537714106 - 3537776047 - 9783406425905 - 9783766323989 - 9783891721322 - 9783832909598 - 376160405X - 9783555004686 - 3415038939 - 3537706014 - 9783537714084 - 9783543549601 - 3423050241 - 3891721323 - 3537775237 - 3406397875 - 9783423055598 - 3472111186 - 3406425909 - 9783423050241 - 9783406361678 - 9783761604984 - 3406497136 - 9783774740983 - 9783406525834 - 3406418546 - 3423055782 - 9783761604052 - 9783871931376 - 9783774563766 - 9783406397875 - 9783537776044 - 9783537775238 - 3766304291 - 9783423055789 - 3896991841 - 3537714084 - 9783415038936 - 9783537706010 - 9783537714107 - 3774740984 - 3774563764 - 3766321080 - 3555004689 - 376160498X - 9783406497131 - 354354960X - 3766323989 - 3802974913 - 3871931861 - 9783503027880 - 9783543540004 - 9783871931864 - 9783170018259 - 9783537714114 - 9783802974915 - 3871931373 - 9783766304292 - 9783896991843 - 3543540009 - 3406361676 - 9783472111184 - 9783766321084 - 3503027882
Author's Alternative Names:
"Germany." and "Moritz J. Bonn"Access and General Info:
- First Year Published: 1976
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Sozialgesetzbuch at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Data and Goliath
By Bruce Schneier

“Data and Goliath” Metadata:
- Title: Data and Goliath
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 383
- Publisher: ➤ W. W. Norton - W.W. Norton & Company - Recorded Books, Inc. and Blackstone Publishing - Norton & Company, Incorporated, W. W.
- Publish Date: 2015 - 2016
- Publish Location: New York, New York, USA
“Data and Goliath” Subjects and Themes:
- Subjects: ➤ privacy - National Security Agency - signal intelligence - Internet - data surveillance - security - Social control - Electronic surveillance - Big data - Social aspects - Computer security - Right of Privacy - Information technology - Technology, social aspects - Privacy, right of - Data protection - nyt:combined-print-and-e-book-nonfiction=2015-03-22 - New York Times bestseller - Personenbezogene Daten - Datenerfassung - Elektronische Überwachung - Elektronisk övervakning - Sociala aspekter - Informationsteknik - Dataskydd - Personlig integritet - Right of privacy - Computers and IT
- People: Edward Snowdon
- Places: cyberspace
- Time: 2000-2015
Edition Identifiers:
- The Open Library ID: OL33881885M - OL25748235M - OL28578045M
- Online Computer Library Center (OCLC) ID: 904399710
- Library of Congress Control Number (LCCN): 2014048365
- All ISBNs: ➤ 9780393244816 - 9781664442412 - 039335217X - 1664442413 - 9780393352177 - 0393244814
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data and Goliath at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Security in computing
By Charles P. Pfleeger, Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies

“Security in computing” Metadata:
- Title: Security in computing
- Authors: Charles P. PfleegerCharles P. PfleegerShari Lawrence PfleegerJonathan Margulies
- Language: English
- Number of Pages: Median: 746
- Publisher: ➤ Prentice-Hall International - Prentice Hall PTR - Pearson Education, Limited - Prentice Hall
- Publish Date: ➤ 1989 - 1996 - 2002 - 2003 - 2006 - 2015
- Publish Location: ➤ [London] - Upper Saddle River, N.J - London - Upper Saddle River, NJ
“Security in computing” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Right of Privacy - Rechnernetz - Datensicherung - Computerbeveiliging - Computers - Access control - Firewalls (Computer security) - Operating systems (Computers) - Linux - Privacy, Right of
Edition Identifiers:
- The Open Library ID: ➤ OL35566361M - OL9294548M - OL7339893M - OL25651390M - OL28953547M - OL9286053M - OL7331405M - OL16578902M - OL22148780M
- Online Computer Library Center (OCLC) ID: 50676236 - 71004261
- Library of Congress Control Number (LCCN): 2014043643 - 2006026798 - 2002034368 - 2014038579
- All ISBNs: ➤ 0137990162 - 9780132390774 - 9780130355485 - 0131857940 - 9780134085043 - 0134085051 - 0132390779 - 9780134085050 - 9780137990160 - 0134085043 - 0130355488 - 9780131857940
Author's Alternative Names:
"Shari Pfleeger"Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Information Security
By Mark Stamp

“Information Security” Metadata:
- Title: Information Security
- Author: Mark Stamp
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons Canada, Limited, John - John Wiley & Sons, Ltd. - Wiley-Interscience - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2005 - 2006 - 2007 - 2011 - 2021 - 2022
- Publish Location: Hoboken, N.J - New York
“Information Security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer security - Nonfiction - Electronic data processing departments, security measures - Sécurité informatique - Ordinateurs - Accès - Contrôle - Logiciels - Protection - Protocoles de réseaux d'ordinateurs - Sécurité - Mesures - Cryptographie - Databescherming - Informatiesystemen - Computersicherheit - Datensicherung - Kommunikationsprotokoll - Kryptologie - Malware - Zugriffskontrolle - Data protection - Computer Security - Qa76.9.a25 s69 2006 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL48712508M - OL48647918M - OL39897508M - OL34977085M - OL33919263M - OL33919251M - OL33642192M - OL29229520M - OL29065438M - OL29065437M - OL9527643M - OL7620834M - OL24253402M - OL15978508M
- Online Computer Library Center (OCLC) ID: 57754240 - 85820655
- Library of Congress Control Number (LCCN): 2005005152
- All ISBNs: ➤ 1119505879 - 1119505887 - 1118027965 - 9781119505891 - 1283138875 - 1119505895 - 9780471744184 - 0470242442 - 9781283138871 - 9781280241444 - 0471744190 - 9780470242445 - 0471738484 - 1118027957 - 1280241446 - 1118027973 - 9781119505907 - 9781118027967 - 9780471738480 - 9781118027974 - 1119505909 - 0471744182 - 9781118027950 - 9781119505884 - 9781119505877 - 9780471744191
First Setence:
"The basic terminology of crypto includes the following."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15This Is How They Tell Me the World Ends
By Nicole Perlroth

“This Is How They Tell Me the World Ends” Metadata:
- Title: ➤ This Is How They Tell Me the World Ends
- Author: Nicole Perlroth
- Language: English
- Number of Pages: Median: 528
- Publisher: Bloomsbury Publishing
- Publish Date: 2021 - 2022
“This Is How They Tell Me the World Ends” Subjects and Themes:
- Subjects: ➤ Terrorism - Information warfare - Computer security - Law and legislation - Data protection - Internet - Cyberspace operations (Military science) - Cyberterrorism - Computer crimes
Edition Identifiers:
- The Open Library ID: OL32405347M - OL31913494M
- Online Computer Library Center (OCLC) ID: 1243630863
- All ISBNs: 1635576059 - 9781635578492 - 9781635576054 - 1635578493
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find This Is How They Tell Me the World Ends at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16e-Business and Telecommunications
By Mohammad S. Obaidat and Joaquim Filipe

“e-Business and Telecommunications” Metadata:
- Title: ➤ e-Business and Telecommunications
- Authors: Mohammad S. ObaidatJoaquim Filipe
- Language: English
- Number of Pages: Median: 419
- Publisher: ➤ Obaidat Mohammad S - Springer London, Limited - Springer International Publishing AG - Springer - MOXIC
- Publish Date: ➤ 2008 - 2009 - 2011 - 2012 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2022
“e-Business and Telecommunications” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Telecommunication - Telecommunication systems - Computer networks - Congresses - Business - Data processing - Mobile communication systems - Information retrieval - Information organization - Information Systems Applications (incl. Internet) - Computer science - Computer Communication Networks - Data protection - Information storage and retrieval systems - Systems and Data Security
Edition Identifiers:
- The Open Library ID: ➤ OL30141071M - OL37311881M - OL34521668M - OL37109616M - OL27962825M - OL34885872M - OL34383445M - OL35591303M - OL34533700M - OL34521702M - OL27965142M - OL27976199M - OL37140489M - OL28114542M - OL37124445M - OL28185892M - OL28127215M - OL28242624M
- Library of Congress Control Number (LCCN): 2012954173
- All ISBNs: ➤ 9783030904272 - 3319259156 - 9783030348656 - 3319302221 - 3540886532 - 9783662447871 - 9783642357541 - 303090427X - 9783540886532 - 3662447908 - 3319678752 - 3030526852 - 9783642200779 - 9783030110383 - 3662447878 - 9783030526856 - 3662447886 - 9783319678757 - 9783662447901 - 3642357547 - 3030348652 - 3662447916 - 9783319259147 - 9783319302218 - 9783662447888 - 3642200788 - 9783319259154 - 364220077X - 9783642200786 - 9783642051975 - 9783662447918 - 3319259148 - 3030110389 - 3642051979 - 3319302213 - 9783319302225
Author's Alternative Names:
"Filipe Joaquim"Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find e-Business and Telecommunications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Art of Invisibility
By Kevin D. Mitnick

“Art of Invisibility” Metadata:
- Title: Art of Invisibility
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ Hachette Book Group USA - Little Brown & Company
- Publish Date: 2017 - 2018 - 2019
“Art of Invisibility” Subjects and Themes:
- Subjects: Computer security - Data protection - Privacy, right of - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL29408041M - OL29742767M - OL31995555M
- All ISBNs: ➤ 0316526924 - 0316380490 - 0316380520 - 9780316380492 - 9780316380522 - 9780316526920
Author's Alternative Names:
"Kevin MITNICK", "Kevin David Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin Mitnick" and "KD Mitnick"Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Art of Invisibility at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Information security
By United States. General Accounting Office
“Information security” Metadata:
- Title: Information security
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 32
- Publisher: ➤ U.S. General Accounting Office - The Office [distributor - United States General Accounting Office - The Office - U.S. GAO
- Publish Date: ➤ 1987 - 1989 - 1990 - 1991 - 1996 - 1998 - 1999 - 2000 - 2001 - 2002 - 2004
- Publish Location: ➤ Washington, DC - Washington, D.C. (P.O. Box 37050, Washington 20013) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) - Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Washington, D.C - Gaithersburg, Md. (P.O. Box 6015, Gaithersburg 20877) - Washington D.C. (P.O. Box 37050, Washington D.C. 20013)
“Information security” Subjects and Themes:
- Subjects: ➤ Access control - Administrative agencies - Agriculture - Armed Forces - Auditing - Automation - B-2 bomber - Classified Defense information - Communication systems - Computer networks - Computer security - Confidential communications - Congresses - Correspondence - Data processing - Data protection - Databases - Disclosure of information - District of Columbia Highway Trust Fund - Electronic filing systems - Electronic government information - Evaluation - Finance - Government communication systems - Information Systems - Information resources management - Information services - Law and legislation - National security - Northrop Corporation - Northrop Corporation. Advanced Systems Division - Official secrets - Officials and employees - Presidents - Public key infrastructure (Computer security) - Research - Roads - Security classification (Government documents) - Security measures - Staff - Tax returns - Telecommunication - United States - United States Dept. of Agriculture - United States. Dept. of Agriculture - United States. Dept. of Defense - United States. Dept. of Energy - United States. Dept. of the Interior - United States. Internal Revenue Service - United States. National Aeronautics and Space Administration - United States. Department of Energy - United States. Department of Defense - Information systems - United States. Department of the Interior - United States Department of Agriculture
- Places: America - United States - Washington (D.C.)
Edition Identifiers:
- The Open Library ID: ➤ OL14537760M - OL3996142M - OL14499506M - OL3350407M - OL571739M - OL15363773M - OL6833632M - OL3995654M - OL3986830M - OL6833902M - OL14530741M - OL14538290M - OL3996134M - OL6833140M - OL100136M - OL17674787M - OL4016390M - OL3995917M - OL17716660M - OL477378M
- Online Computer Library Center (OCLC) ID: 45544837 - 20402263 - 39980899 - 50749371 - 24153147
- Library of Congress Control Number (LCCN): ➤ 2001387097 - 00328711 - 99214381 - 2001337551 - 2001315871 - 00327399 - 00328215 - 2001337869 - 2004368656 - 2001337144 - 2001337881 - 98203144 - 96157993
Author's Alternative Names:
"General Accountability Office (U.S.)", "U.S. General Accounting Office", "U.S. General Accounting Office.", "United States General Accounting Office.", "United States General Accounting Office ", "United States. General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office.", "General Accounting Office (U.S.)", "United States. General Accounting OFfice." and "U S. General Accounting Office",Access and General Info:
- First Year Published: 1987
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Mindf*ck
By Christopher Wylie

“Mindf*ck” Metadata:
- Title: Mindf*ck
- Author: Christopher Wylie
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 288
- Publisher: ➤ Roca Editorial - Random House Publishing Group - Random House - TBS/GBS/Transworld - Random House, Incorporated
- Publish Date: 2019 - 2020
“Mindf*ck” Subjects and Themes:
- Subjects: ➤ Military art and science - Data protection - United states, biography - Political campaigns - Internet in political campaigns - Facebook (electronic resource) - Social media - Presidents, united states, election, 2016 - Corrupt practices - Presidents - Election - Law and legislation - Big data - Social aspects - Information society - Internet - Internet marketing - Internet advertising - Fake news - Cambridge Analytica Ltd - Facebook (Firm)
Edition Identifiers:
- The Open Library ID: ➤ OL29857903M - OL29851304M - OL27601445M - OL29488596M - OL29996307M - OL27601438M
- Online Computer Library Center (OCLC) ID: 1111388757
- All ISBNs: ➤ 9781984854643 - 9781788165006 - 9780593229149 - 1788165004 - 1984854631 - 9788418014246 - 1984854658 - 9781984854636 - 0593229142 - 8418014245 - 9781984854650 - 198485464X
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mindf*ck at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Mindf*ck
Cambridge Analytica and the Plot to Break America
By Christopher Wylie

“Mindf*ck” Metadata:
- Title: Mindf*ck
- Author: Christopher Wylie
- Publisher: Random House
- Publish Date: 2019
“Mindf*ck” Subjects and Themes:
- Subjects: ➤ Facebook (electronic resource) - Presidents, united states, election, 2016 - Internet in political campaigns - Political campaigns - Social media - Data protection - United states, biography
Edition Identifiers:
- The Open Library ID: OL27691627M
- All ISBNs: 9781984854636 - 1984854631
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Mindf*ck at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Future crimes
By Marc Goodman

“Future crimes” Metadata:
- Title: Future crimes
- Author: Marc Goodman
- Language: English
- Number of Pages: Median: 392
- Publisher: Doubleday
- Publish Date: 2015
“Future crimes” Subjects and Themes:
- Subjects: ➤ Moral and ethical aspects - Computer crimes - Prevention - Computer security - Technological innovations - Data protection - nyt:business-books=2015-03-08 - New York Times bestseller - Technische Innovation - Computersicherheit - Datensicherung - Kriminalität - Data processing - Ethical aspects
Edition Identifiers:
- The Open Library ID: OL27173287M
- Online Computer Library Center (OCLC) ID: 893857964
- Library of Congress Control Number (LCCN): 2014038053
- All ISBNs: 9780385539005 - 0385539002
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Future crimes at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Tribe of Hackers
By Marcus J. Carey and Jennifer Jin

“Tribe of Hackers” Metadata:
- Title: Tribe of Hackers
- Authors: Marcus J. CareyJennifer Jin
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - Independently published - Wiley & Sons Canada, Limited, John
- Publish Date: 2019
“Tribe of Hackers” Subjects and Themes:
- Subjects: ➤ Data protection - Computer networks, security measures - Computer security - Risk management - Business enterprises
Edition Identifiers:
- The Open Library ID: OL29444178M - OL29444151M - OL32926095M - OL38315372M - OL28902773M
- All ISBNs: ➤ 9781119643371 - 1119643376 - 1119643406 - 1119643384 - 9781119643388 - 1119643392 - 9781119643401 - 1793464189 - 9781119643395 - 9781793464187
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Tribe of Hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Information and communications technology law
By D. P. Van Der Merwe
“Information and communications technology law” Metadata:
- Title: ➤ Information and communications technology law
- Author: D. P. Van Der Merwe
- Language: English
- Number of Pages: Median: 526
- Publisher: LexisNexis
- Publish Date: 2008
- Publish Location: Durban
“Information and communications technology law” Subjects and Themes:
- Subjects: ➤ Computers - Telecommunication - Internet - Law and legislation - Computer crimes - Data protection
- Places: South Africa
Edition Identifiers:
- The Open Library ID: OL24035852M - OL24106125M
- Library of Congress Control Number (LCCN): 2009404481
- All ISBNs: 9780409020281 - 0409020281
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information and communications technology law at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Get the Truth
Former CIA Officers Teach You How to Persuade Anyone to Tell All
By Philip Houston

“Get the Truth” Metadata:
- Title: Get the Truth
- Author: Philip Houston
- Language: English
- Number of Pages: Median: 304
- Publisher: ➤ Houston Philip - Macmillan Audio - Icon Books, Limited - St. Martin's Press - St. Martin's Griffin
- Publish Date: 2014 - 2015 - 2016
- Publish Location: New York
“Get the Truth” Subjects and Themes:
- Subjects: ➤ Persuasion (Psychology) - Confidential communications - Disclosure of information - Data protection - Persuasion (psychology) - Questioning - nyt:espionage=2015-04-12 - New York Times bestseller - Truthfulness and falsehood - Lie detectors and detection
Edition Identifiers:
- The Open Library ID: ➤ OL34509292M - OL27512269M - OL29254347M - OL25641867M - OL34618025M - OL27973187M - OL37408813M
- Library of Congress Control Number (LCCN): 2014021143
- All ISBNs: ➤ 9781250043337 - 9781848316676 - 9781466841390 - 1848316674 - 1466841397 - 9781785780295 - 9781250080592 - 1250080592 - 1785780298 - 1250043336 - 1848318499 - 9781427243799 - 9781848318496 - 1427243794
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Get the Truth at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Cloud Computing Security
By John R. Vacca

“Cloud Computing Security” Metadata:
- Title: Cloud Computing Security
- Author: John R. Vacca
- Language: English
- Number of Pages: Median: 522
- Publisher: ➤ CRC Press - Taylor & Francis Group
- Publish Date: 2016 - 2020
“Cloud Computing Security” Subjects and Themes:
- Subjects: ➤ Mathematics - Cloud computing - Security measures - Computer networks - Data protection - Computer security - Computer Security - Infonuagique - Sécurité - Mesures - Réseaux d'ordinateurs - Protection de l'information (Informatique) - Sécurité informatique - COMPUTERS - Computer Graphics - Game Programming & Design - Information Technology - Security - General - Games - Information technology - Computer engineering - Professional, career & trade -> computer science -> programming languages (jr/sr) - Professional, career & trade -> computer science -> information technology - Professional, career & trade -> computer science -> security - Professional, career & trade -> computer science -> computer engineering - Professional, career & trade -> computer science -> internet & www - Sccm30 - Sccm4810 - Sccm5515 - Wb028 - Wb057 - Wb058 - Wb070 - Wb074 - Wb075
Edition Identifiers:
- The Open Library ID: ➤ OL33726402M - OL33662921M - OL33798177M - OL33798179M - OL33798208M - OL34681607M - OL29517614M - OL33621888M - OL33798190M - OL34671962M - OL33508759M
- Online Computer Library Center (OCLC) ID: 1193069843
- All ISBNs: ➤ 0429617496 - 9780429619649 - 9780429055126 - 1315354926 - 0429621795 - 1482260956 - 0429619642 - 0367151162 - 9780429617492 - 9781315354927 - 9780367151164 - 0367658402 - 9780367658403 - 036756033X - 9780367560331 - 1315335867 - 0429055129 - 1315372118 - 9781315372112 - 9781482260953 - 9781315335865 - 9780429621796
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cloud Computing Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Security without Obscurity
By Jeff Stapleton

“Security without Obscurity” Metadata:
- Title: Security without Obscurity
- Author: Jeff Stapleton
- Language: English
- Number of Pages: Median: 236
- Publisher: ➤ Auerbach Publishers, Incorporated - Auerbach Publications - Taylor & Francis Group - CRC Press LLC
- Publish Date: 2016 - 2018 - 2021
“Security without Obscurity” Subjects and Themes:
- Subjects: ➤ Telecommunication - Data encryption (computer science) - Computer network architectures - Security measures - Data encryption (Computer science) - Télécommunications - Sécurité - Mesures - Chiffrement (Informatique) - Réseaux d'ordinateurs - Architectures - COMPUTERS - Security - Networking - Public key infrastructure (Computer security) - Data protection - Standards - Information technology - Infrastructure à clé publique (Sécurité informatique) - Protection de l'information (Informatique) - Normes - Technologie de l'information
Edition Identifiers:
- The Open Library ID: ➤ OL36216520M - OL37638203M - OL33824895M - OL36228799M - OL37982682M - OL34620771M - OL36747222M - OL33824616M - OL36755710M - OL27349027M - OL33824890M - OL37980814M - OL33824623M - OL37983527M
- Online Computer Library Center (OCLC) ID: 951429268 - 1044733855
- All ISBNs: ➤ 9780815396413 - 0429467524 - 0815396414 - 1498788211 - 9780429884870 - 9780429884887 - 9780429884894 - 0367708132 - 1498707475 - 9781000349535 - 0429884893 - 9781498788212 - 9781000349597 - 042916033X - 1003041892 - 1000349594 - 100034956X - 9781000349566 - 0429884877 - 1000349535 - 0429884885 - 9780429160332 - 9780429467523 - 9781003041894 - 9780367708139 - 9781498707480 - 9781498707473 - 1498707483
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security without Obscurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cybersecurity Law
By Jeff Kosseff

“Cybersecurity Law” Metadata:
- Title: Cybersecurity Law
- Author: Jeff Kosseff
- Language: English
- Number of Pages: Median: 616
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2017 - 2019 - 2022
“Cybersecurity Law” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Computer crimes - Crime prevention - Privacy, right of - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL39940096M - OL40047693M - OL29326263M - OL29326245M - OL27417696M - OL28689154M - OL38006157M - OL44173134M - OL38014497M - OL37339679M - OL29433183M - OL29433181M
- All ISBNs: ➤ 9781119517290 - 9781119517320 - 1119822165 - 111951729X - 1119822181 - 1119517206 - 9781119231899 - 9781119231882 - 9781119517207 - 1119231868 - 1119822173 - 1119232023 - 9781119232018 - 1119232015 - 9781119231509 - 9781119822172 - 1119231884 - 9781119822189 - 1119231507 - 9781119231868 - 1119231892 - 9781119822165 - 111951732X - 9781119232025
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cybersecurity Law at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Optimal Spending on Cybersecurity Measures
By Tara Kissoon

“Optimal Spending on Cybersecurity Measures” Metadata:
- Title: ➤ Optimal Spending on Cybersecurity Measures
- Author: Tara Kissoon
- Language: English
- Number of Pages: Median: 176
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2021 - 2024 - 2025
“Optimal Spending on Cybersecurity Measures” Subjects and Themes:
- Subjects: ➤ Commerce - Data protection - Computer security - Computer networks - Security measures - Risk management - BUSINESS & ECONOMICS / Information Management - BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management - BUSINESS & ECONOMICS / Management
Edition Identifiers:
- The Open Library ID: ➤ OL57745811M - OL53269922M - OL53386448M - OL57737425M - OL33922814M - OL51049554M - OL33922755M - OL53270017M - OL33918263M - OL33922737M - OL57740307M - OL53373420M - OL57745815M - OL51046673M - OL51797133M
- Online Computer Library Center (OCLC) ID: 1248601757
- Library of Congress Control Number (LCCN): 2021015075
- All ISBNs: ➤ 9781032959337 - 9781032960142 - 9781032863634 - 1032061405 - 1032960140 - 9781000440768 - 9781003847052 - 1032061413 - 1032959339 - 1040096522 - 1003847056 - 9781032061412 - 1040096492 - 9781000440706 - 9781040096529 - 1003847048 - 9781003847045 - 1000440702 - 9781032823577 - 9781032960135 - 9781040096499 - 9781032061405 - 9781032959351 - 1003200893 - 1032960132 - 1032959355 - 1032823577 - 1000440761 - 1032863633 - 9781003200895
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Optimal Spending on Cybersecurity Measures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Cyber security policy guidebook
By Jennifer L. Bayuk

“Cyber security policy guidebook” Metadata:
- Title: ➤ Cyber security policy guidebook
- Author: Jennifer L. Bayuk
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Wiley - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2012 - 2014
- Publish Location: Hoboken, NJ
“Cyber security policy guidebook” Subjects and Themes:
- Subjects: Government policy - COMPUTERS / Security / General - Computer security - Data protection - Information technology
Edition Identifiers:
- The Open Library ID: ➤ OL39903549M - OL39881735M - OL35501533M - OL29091126M - OL29091122M - OL25054019M
- Online Computer Library Center (OCLC) ID: 694396524
- Library of Congress Control Number (LCCN): 2011036017
- All ISBNs: ➤ 1299189326 - 9781118241325 - 1118241320 - 9781118657966 - 9781118241530 - 1118657969 - 9781118241486 - 1118027809 - 1118241533 - 1118241487 - 9781299189324 - 9781118027806
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber security policy guidebook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Security in Computing and Communications
By Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat and Jose M. Alcaraz Calero

“Security in Computing and Communications” Metadata:
- Title: ➤ Security in Computing and Communications
- Authors: Sabu M. ThampiSanjay MadriaGuojun WangDanda B. RawatJose M. Alcaraz Calero
- Language: English
- Number of Pages: Median: 460
- Publisher: ➤ Springer - Lloret Mauri Jaime - Springer Singapore Pte. Limited - Springer London, Limited
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2021
“Security in Computing and Communications” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computers, access control - Computer science - Computer Communication Networks - Data protection - Systems and Data Security - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: ➤ OL36217183M - OL30785909M - OL28961763M - OL28305858M - OL37235873M - OL30321492M - OL28178189M - OL37322457M - OL30195670M - OL30528404M - OL37236356M - OL34541263M - OL28337128M
- All ISBNs: ➤ 366244965X - 3642405762 - 9789811068997 - 9811068992 - 3319229141 - 9783319229140 - 9811548242 - 9789811358258 - 9783319229157 - 9789811027376 - 9789811548260 - 9783642405761 - 3662449668 - 9783662449660 - 9789811548246 - 9811548269 - 9811027390 - 9789811068973 - 9811027374 - 9811068976 - 331922915X - 9789811027390 - 9811604215 - 9783662449653 - 9811358257 - 9789811604218
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in Computing and Communications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Financial Cryptography and Data Security
By Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan Wallach, Michael Brenner and Kurt Rohloff

“Financial Cryptography and Data Security” Metadata:
- Title: ➤ Financial Cryptography and Data Security
- Authors: ➤ Jeremy ClarkSarah MeiklejohnPeter Y. A. RyanDan WallachMichael BrennerKurt Rohloff
- Language: English
- Number of Pages: Median: 323
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2025
“Financial Cryptography and Data Security” Subjects and Themes:
- Subjects: ➤ Electronic funds transfers - Data encryption (computer science) - Electronic commerce - Computer security - Internet, security measures - Cryptography, data processing - System design - Computer networks, security measures - Internal security - Computer science - Data protection - Information systems - Systems and Data Security - Data Encryption - E-Commerce/e-business - Computer Appl. in Administrative Data Processing
Edition Identifiers:
- The Open Library ID: ➤ OL57532211M - OL28239582M - OL30907132M - OL29728105M - OL34528868M - OL28253524M - OL28249616M - OL28281516M - OL57550244M - OL30358706M - OL30527919M - OL28740778M - OL37229466M - OL28041391M
- All ISBNs: ➤ 3662447738 - 3662583860 - 9783662480502 - 9783662588192 - 3031786750 - 3662480506 - 9783662583869 - 9783642413216 - 364241320X - 9783031786754 - 9783319702773 - 9783662447734 - 3031786785 - 9783662533567 - 3030437248 - 9783030437244 - 9783031786785 - 3662588196 - 3642413196 - 9783319428260 - 3319428268 - 9783642413209 - 3662480514 - 9783642413193 - 3319702777 - 9783662480519 - 3662533561 - 3642413218
Author's Alternative Names:
"Peter Y A Ryan" and "Peter Y.A. Ryan"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Financial Cryptography and Data Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Intelligence and Security Informatics
By Michael Chau

“Intelligence and Security Informatics” Metadata:
- Title: ➤ Intelligence and Security Informatics
- Author: Michael Chau
- Language: English
- Number of Pages: Median: 144
- Publisher: ➤ Springer Berlin Heidelberg - Springer London, Limited - Springer
- Publish Date: ➤ 2012 - 2013 - 2014 - 2015 - 2016 - 2017
- Publish Location: Berlin, Heidelberg
“Intelligence and Security Informatics” Subjects and Themes:
- Subjects: ➤ Computers - Data Mining and Knowledge Discovery - Computers and Society - Computer networks - Law and legislation - Information Systems - Information Systems Applications (incl. Internet) - Computer science - Management of Computing and Information Systems - Data mining - Legal Aspects of Computing - Computer security - Computer networks, security measures - Expert systems (computer science) - National security - Information retrieval - Information organization - Computer Communication Networks - Data protection - Information storage and retrieval systems - Systems and Data Security
Edition Identifiers:
- The Open Library ID: ➤ OL27046085M - OL29610282M - OL37229394M - OL28155630M - OL37229176M - OL34376973M - OL28735827M - OL34536888M - OL34520875M - OL28160491M - OL29366182M - OL28167799M
- All ISBNs: ➤ 3319184555 - 9783642396922 - 9783642304286 - 3319066765 - 3642304281 - 9783319574622 - 3319066773 - 3319318624 - 9783319184555 - 3319184547 - 3642220401 - 9783319066769 - 3642396925 - 3642396933 - 9783319066776 - 9783642220401 - 9783319318639 - 9783319318622 - 3319574620 - 9783642304293 - 9783642396939 - 3319318632 - 364230429X - 9783319184548
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intelligence and Security Informatics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Bharat's the Indian cyber laws with cyber glossary
By Suresh T. Viswanathan
“Bharat's the Indian cyber laws with cyber glossary” Metadata:
- Title: ➤ Bharat's the Indian cyber laws with cyber glossary
- Author: Suresh T. Viswanathan
- Language: English
- Number of Pages: Median: 424
- Publisher: Bharat Law House
- Publish Date: 2001
- Publish Location: New Delhi
“Bharat's the Indian cyber laws with cyber glossary” Subjects and Themes:
- Subjects: Computer networks - Data protection - Electronic commerce - Law and legislation
- Places: India
Edition Identifiers:
- The Open Library ID: OL6871551M
- Online Computer Library Center (OCLC) ID: 46792870
- Library of Congress Control Number (LCCN): 00403506
- All ISBNs: 8177370243 - 9788177370249
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Bharat's the Indian cyber laws with cyber glossary at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Cyber Security
By Helen Wong MBE

“Cyber Security” Metadata:
- Title: Cyber Security
- Author: Helen Wong MBE
- Language: English
- Number of Pages: Median: 524
- Publisher: ➤ Bloomsbury Publishing Plc - Bloomsbury Professional
- Publish Date: 2018 - 2024
“Cyber Security” Subjects and Themes:
- Subjects: Computer security - Law and legislation - Data protection - Law - Privacy & data protection
Edition Identifiers:
- The Open Library ID: OL51325460M - OL34645883M - OL33609967M - OL33561772M
- Online Computer Library Center (OCLC) ID: 1090430562 - 1491307573
- All ISBNs: ➤ 1526505878 - 9781526505880 - 9781526505873 - 152652810X - 152650586X - 9781526505866 - 1526505886 - 9781526528100
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Mastering network security
By Chris Brenton and Cameron Hunt

“Mastering network security” Metadata:
- Title: Mastering network security
- Authors: Chris BrentonCameron Hunt
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ SYBEX - John Wiley & Sons, Ltd. - Sybex - Network - Wiley & Sons, Incorporated, John
- Publish Date: 1998 - 2002 - 2003 - 2006
- Publish Location: ➤ New York - London - San Francisco, Calif
“Mastering network security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer networks - Computer security - Data protection - Nonfiction - Security measures - Networking - COMPUTERS - General - Internet - Security - Data security & data encryption - Network security - Computers - Computer Security - Computer Data Security - Microcomputer Networks - Computer Books: General - Security - General - Networking - General - Computers / Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL24265867M - OL39884225M - OL8096564M - OL398234M - OL22445777M
- Online Computer Library Center (OCLC) ID: 745061767 - 40647147
- Library of Congress Control Number (LCCN): 98087201 - 2002108077
- All ISBNs: ➤ 0782151485 - 0782141420 - 9781280650055 - 9780782151480 - 9780782141429 - 0782123430 - 9780782123432 - 1280650052
First Setence:
"WE ALL PROBABLY HAVE an idea about what the word system means."
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Information security and cryptology
By Helger Lipmaa, Moti Yung and Donghai Lin

“Information security and cryptology” Metadata:
- Title: ➤ Information security and cryptology
- Authors: Helger LipmaaMoti YungDonghai Lin
- Language: English
- Number of Pages: Median: 524
- Publisher: ➤ Springer London, Limited - Springer - Springer International Publishing AG - Springer Berlin / Heidelberg
- Publish Date: ➤ 2006 - 2008 - 2009 - 2010 - 2011 - 2013 - 2021 - 2023 - 2024
“Information security and cryptology” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Cryptography - Computer science - Computer networks - Computer software - Information networks - Data protection - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL34807476M - OL37323603M - OL35761680M - OL37163304M - OL35767159M - OL37140622M - OL51049907M - OL9058180M - OL34456968M - OL51040728M - OL34466771M - OL46571079M
- Online Computer Library Center (OCLC) ID: 76686135
- Library of Congress Control Number (LCCN): 2006936729
- All ISBNs: ➤ 3642385184 - 3540496084 - 9783031265525 - 9783540496106 - 3030883221 - 3031265521 - 9783540794998 - 9783642014406 - 3642014402 - 9819709415 - 9783642163425 - 3642215181 - 3030718514 - 9783642385186 - 9783030883225 - 3642163424 - 9789819709410 - 9789819709441 - 9783642215186 - 9783030718510 - 3540794999 - 3540496106 - 9783540496083 - 981970944X
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security and cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Modeling Decisions for Artificial Intelligence
By Vicenç Torra

“Modeling Decisions for Artificial Intelligence” Metadata:
- Title: ➤ Modeling Decisions for Artificial Intelligence
- Author: Vicenç Torra
- Language: English
- Number of Pages: Median: 333
- Publisher: ➤ Springer Berlin Heidelberg - Springer International Publishing AG - Imprint: Springer - Springer
- Publish Date: ➤ 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - 2021 - 2022 - 2023
- Publish Location: Berlin, Heidelberg
“Modeling Decisions for Artificial Intelligence” Subjects and Themes:
- Subjects: ➤ Pattern perception - Data Mining and Knowledge Discovery - Systems and Data Security - Information organization - Optical pattern recognition - Electronic data processing - Data protection - Information retrieval - Computer science - Information storage and retrieval systems - Data mining - Numeric Computing - Artificial intelligence - Artificial Intelligence (incl. Robotics) - Congresses - Mathematical models - Decision making, mathematical models - Computer simulation - Decision making
Edition Identifiers:
- The Open Library ID: ➤ OL28006188M - OL27075357M - OL28224697M - OL27983824M - OL34887960M - OL28248591M - OL39267977M - OL37313204M - OL33959162M - OL34882615M - OL48186410M - OL28187622M
- Library of Congress Control Number (LCCN): 2012951709
- All ISBNs: ➤ 3319674218 - 9783319456553 - 3031334973 - 3642346200 - 9783031334979 - 9783319120546 - 3030855287 - 9783030855284 - 3030002012 - 9783030267728 - 3319456555 - 3319120549 - 3031134478 - 3030575233 - 3319120530 - 9783319120539 - 9783030575236 - 9783031134470 - 9783642346200 - 9783319232409 - 9783030002015 - 3319232401 - 9783319674216 - 3030267725
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Modeling Decisions for Artificial Intelligence at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Data Protection
By Preston de Guise
“Data Protection” Metadata:
- Title: Data Protection
- Author: Preston de Guise
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ CRC Press - Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2017 - 2020
“Data Protection” Subjects and Themes:
- Subjects: ➤ Engineering - Data recovery (computer science) - Data protection - Computer networks - Security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Protection de l'information (Informatique) - COMPUTERS - Data Processing - Storage & Retrieval - Disaster Recovery - Right of Privacy - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL29347841M - OL28072697M - OL29490370M - OL29392601M - OL29490384M - OL29366659M - OL29490287M - OL29490342M - OL29309573M - OL29488011M - OL29459095M
- Online Computer Library Center (OCLC) ID: 974711770 - 1153834379 - 986586925
- All ISBNs: ➤ 1351689517 - 0367474107 - 9781351689496 - 1482244152 - 9780367474102 - 9781000062571 - 9781315169620 - 1000062511 - 0367463490 - 9781000062458 - 9781000062519 - 1000062457 - 0367256770 - 9781351689502 - 9781351689519 - 1351689509 - 9780367463496 - 1000062570 - 9781482244151 - 1351689495 - 1315169622 - 9780367256777
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Data Protection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Data governance
By John Ladley

“Data governance” Metadata:
- Title: Data governance
- Author: John Ladley
- Language: English
- Number of Pages: Median: 307
- Publisher: ➤ Elsevier Science & Technology Books - Elsevier Science & Technology - Morgan Kaufmann
- Publish Date: 2012 - 2019
- Publish Location: Waltham, MA
“Data governance” Subjects and Themes:
- Subjects: ➤ Data protection - Information resources management - Management information systems - Information technology, management - Datenmanagement - Informationsmanagement - Managementinformationssystem - Protección de datos - Administración de recursos de información - Sistemas de información en administración
Edition Identifiers:
- The Open Library ID: OL34572916M - OL33574683M - OL33464311M - OL25330815M
- Online Computer Library Center (OCLC) ID: 842426549 - 779258319
- Library of Congress Control Number (LCCN): 2012015172
- All ISBNs: ➤ 0123978483 - 9780123978486 - 012815831X - 0124158293 - 9780128158326 - 9780128158319 - 9780124158290 - 0128158328
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Data governance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Routledge handbook of surveillance studies
By David Lyon, Kevin D. Haggerty and Kirstie Ball

“Routledge handbook of surveillance studies” Metadata:
- Title: ➤ Routledge handbook of surveillance studies
- Authors: David LyonKevin D. HaggertyKirstie Ball
- Language: English
- Number of Pages: Median: 449
- Publisher: ➤ Routledge - Taylor & Francis Group
- Publish Date: 2012 - 2014
- Publish Location: New York, NY - Abingdon, Oxon
“Routledge handbook of surveillance studies” Subjects and Themes:
- Subjects: ➤ Social aspects - Social control - Right of Privacy - Electronic surveillance - Information technology - Überwachung - Soziale Kontrolle - Theorie - Datenschutz - Elektronische Überwachung - Electronic surveillance, social aspects - Data protection - Privacy, right of - Civil rights - Surveillance électronique - Aspect social - Technologie de l'information - Contrôle social - POLITICAL SCIENCE - Political Freedom & Security - Law Enforcement
Edition Identifiers:
- The Open Library ID: ➤ OL46031732M - OL38312191M - OL37976819M - OL37969527M - OL33771368M - OL33626376M - OL27926460M - OL25067311M
- Online Computer Library Center (OCLC) ID: 642845991 - 863684141 - 794003715
- Library of Congress Control Number (LCCN): 2011041478
- All ISBNs: ➤ 1136711074 - 0203814940 - 1136711066 - 9781280660467 - 9781136711015 - 1136711023 - 1138026026 - 9781136711077 - 9781136711060 - 9781138026025 - 1280660465 - 113671104X - 9781136711046 - 9780415588836 - 9781136711022 - 0415588839 - 1136711015 - 9780203814949
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Routledge handbook of surveillance studies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Einführung in das Datenschutzrecht
By Marie-Theres Tinnefeld

“Einführung in das Datenschutzrecht” Metadata:
- Title: ➤ Einführung in das Datenschutzrecht
- Author: Marie-Theres Tinnefeld
- Language: ger
- Number of Pages: Median: 470
- Publisher: ➤ de Gruyter GmbH, Walter - R. Oldenbourg - Oldenbourg
- Publish Date: ➤ 1994 - 1998 - 2005 - 2012 - 2017 - 2019 - 2024
- Publish Location: München
“Einführung in das Datenschutzrecht” Subjects and Themes:
- Subjects: ➤ Data protection - Law and legislation - Privacy, Right of - Public records - Right of Privacy - Law, germany - Privacy, right of
- Places: Germany
Edition Identifiers:
- The Open Library ID: ➤ OL37271810M - OL37272128M - OL37302921M - OL37252858M - OL1234941M - OL36740758M - OL51579196M - OL37380570M - OL51577875M - OL37302919M - OL435564M - OL37191885M
- Library of Congress Control Number (LCCN): 98144574 - 94237944
- All ISBNs: ➤ 3110416735 - 9783486273038 - 3486241125 - 9783486719567 - 9783111019147 - 3111019144 - 9783486229400 - 3110630338 - 9783111018751 - 311101875X - 9783110416732 - 3486719564 - 9783110630312 - 3486273035 - 3110423944 - 3110416727 - 9783110630459 - 3110630311 - 9783110416725 - 9783110423945 - 9783486241129 - 3110630451 - 3486229400 - 9783110630336
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Einführung in das Datenschutzrecht at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Information Security and IT Risk Management
By Manish Agrawal, Alex Campoe and Eric Pierce

“Information Security and IT Risk Management” Metadata:
- Title: ➤ Information Security and IT Risk Management
- Authors: Manish AgrawalAlex CampoeEric Pierce
- Language: English
- Number of Pages: Median: 432
- Publisher: ➤ Prospect Press - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2014 - 2024
“Information Security and IT Risk Management” Subjects and Themes:
- Subjects: ➤ Data protection - Computer networks, security measures - Computer security - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL39965058M - OL35585978M - OL39956474M - OL51136479M - OL51140724M - OL27557753M
- Library of Congress Control Number (LCCN): 2014000622 - 2014010463
- All ISBNs: ➤ 9781118802977 - 1118802977 - 1118803094 - 9781958303160 - 195830316X - 9781958303177 - 111880306X - 9781118335895 - 1118335899 - 9781118803097 - 1958303178 - 9781118803066
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and IT Risk Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Information Security and Cryptology
By Dongdai Lin, Shouhuai Xu and Moti Yung

“Information Security and Cryptology” Metadata:
- Title: ➤ Information Security and Cryptology
- Authors: Dongdai LinShouhuai XuMoti Yung
- Language: English
- Number of Pages: Median: 549
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2005 - 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020
“Information Security and Cryptology” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Cryptography - Computer security - Computer crimes - Computer science - Data protection - Coding theory - Computer software - Systems and Data Security - Data Encryption - Coding and Information Theory - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: ➤ OL27982780M - OL34520758M - OL34520412M - OL30681928M - OL28743416M - OL35758151M - OL27967485M - OL27956435M - OL28191991M - OL28200171M - OL27995485M - OL37262695M
- All ISBNs: ➤ 9783319388977 - 3030429202 - 9783030142339 - 9783319547046 - 3030142337 - 9783540324249 - 9783030429201 - 9783319120867 - 331975159X - 3319388983 - 3540324240 - 3319167448 - 3642347037 - 3319120875 - 9783642347030 - 9783319167442 - 3319120867 - 3319167456 - 9783319751597 - 3319388975 - 9783319388984 - 3319547046 - 9783319167459 - 9783319120874
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Digital Forensics and Watermarking
By Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez and Feng Liu

“Digital Forensics and Watermarking” Metadata:
- Title: ➤ Digital Forensics and Watermarking
- Authors: Yun Qing ShiHyoung Joong KimFernando Perez-GonzalezFeng Liu
- Language: English
- Number of Pages: Median: 464
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2012 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020
“Digital Forensics and Watermarking” Subjects and Themes:
- Subjects: ➤ Forensic sciences - Computer security - Data protection - Watermarks - Data encryption (computer science) - Data structures (computer science) - Information storage and retrieval systems - Computer graphics - Computer vision - Artificial intelligence - Computer networks - Computer science - Data encryption (Computer science) - Coding theory - Data Encryption - Systems and Data Security - Computer Imaging, Vision, Pattern Recognition and Graphics - Computers and Society - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: ➤ OL28338997M - OL34372353M - OL28363753M - OL36218736M - OL34536829M - OL36215055M - OL28311430M - OL28038987M - OL28292342M - OL28246398M - OL28143742M
- All ISBNs: ➤ 331919321X - 3319193201 - 3319319590 - 9783319319605 - 3662438860 - 9783319193205 - 3319319604 - 9783319193212 - 9783319319599 - 9783319534640 - 9783662438855 - 3662438852 - 3030113884 - 9783662438862 - 3319534645 - 3030435741 - 9783642322044 - 9783319641843 - 3642322042 - 9783030113889 - 9783030435745 - 3319641840
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Watermarking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Disaster recovery planning
By Jon William Toigo and Jon Toigo

“Disaster recovery planning” Metadata:
- Title: Disaster recovery planning
- Authors: Jon William ToigoJon Toigo
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ John Wiley - Wiley - Yourdon Press - Prentice Hall PTR - Prentice Hall
- Publish Date: ➤ 1989 - 1995 - 1996 - 1999 - 2000 - 2002 - 2003
- Publish Location: ➤ New York - Upper Saddle River, N.J - Englewood Cliffs, N.J
“Disaster recovery planning” Subjects and Themes:
- Subjects: ➤ Data recovery (Computer science) - Emergency management - Safety measures - Data protection - Planning - Electronic data processing departments - Telecommunication systems - Data processing service centers - Computer security - Security measures - Disasters - Datenverarbeitung - Dienstleistungsbetrieb - Informationssystem - Computer - Planung - Wiederherstellung - Katastrophe - Data recovery (computer science) - Disaster relief
Edition Identifiers:
- The Open Library ID: ➤ OL15476895M - OL2043881M - OL7333424M - OL812402M - OL7612211M - OL18177574M - OL9288074M - OL7331952M - OL9286600M
- Online Computer Library Center (OCLC) ID: 42682600
- Library of Congress Control Number (LCCN): 2002011553 - 88020766 - 99053827 - 95049627
- All ISBNs: ➤ 0130462829 - 9780130462824 - 013084506X - 9780132149419 - 9780130845061 - 9780471121756 - 0471121754 - 0132149419
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Disaster recovery planning at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Cognitive Hack
By James Bone

“Cognitive Hack” Metadata:
- Title: Cognitive Hack
- Author: James Bone
- Language: English
- Number of Pages: Median: 181
- Publisher: ➤ CRC Press, Taylor & Francis Group LLC - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2017 - 2020 - 2024
“Cognitive Hack” Subjects and Themes:
- Subjects: ➤ Data protection - Computer security - Risk management - Business enterprises, computer networks - Commerce - Business enterprises - Security measures - COMPUTERS - Security - General
Edition Identifiers:
- The Open Library ID: ➤ OL29327926M - OL52562393M - OL37979096M - OL37983233M - OL29323782M - OL30171767M - OL37974749M
- Online Computer Library Center (OCLC) ID: 974040696 - 961213858
- Library of Congress Control Number (LCCN): 2016036443
- All ISBNs: ➤ 1032876867 - 149874981X - 9781498749824 - 9781498749817 - 1315368412 - 9781315351421 - 1315351420 - 9781032876863 - 0367567962 - 9781315368412 - 9781315332383 - 1315332388 - 1498749828 - 9780367567965
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cognitive Hack at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47History of Cyber Security Attacks
By Bruce Middleton

“History of Cyber Security Attacks” Metadata:
- Title: ➤ History of Cyber Security Attacks
- Author: Bruce Middleton
- Language: English
- Number of Pages: Median: 239
- Publisher: ➤ CRC Press - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2017 - 2020
“History of Cyber Security Attacks” Subjects and Themes:
- Subjects: ➤ Data protection - Computer crimes - Computer networks, security measures - Cyberterrorism - History - Cyberterrorisme - Histoire - BUSINESS & ECONOMICS - Infrastructure - SOCIAL SCIENCE - General
Edition Identifiers:
- The Open Library ID: ➤ OL37974508M - OL37973557M - OL34639167M - OL34681430M - OL37980801M - OL37977266M
- Online Computer Library Center (OCLC) ID: 998795689 - 975371067
- Library of Congress Control Number (LCCN): 2017008781
- All ISBNs: ➤ 1498785867 - 9781351642378 - 1498785883 - 1351642375 - 1351651900 - 9781498785860 - 0367657856 - 9781351651905 - 9780367657857 - 9781498785884 - 1315155850 - 9781315155852
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find History of Cyber Security Attacks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Information warfare
By Daniel Ventre
“Information warfare” Metadata:
- Title: Information warfare
- Author: Daniel Ventre
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Wiley & Sons, Incorporated, John - John Wiley & Sons - ISTE Ltd.
- Publish Date: 2009 - 2012 - 2013 - 2016
- Publish Location: Hoboken, NJ - London, UK
“Information warfare” Subjects and Themes:
- Subjects: ➤ Business intelligence - Management - Trade secrets - Information technology - Computer security - Security measures - Data protection - Information warfare
Edition Identifiers:
- The Open Library ID: ➤ OL29311081M - OL44152809M - OL35586031M - OL33554828M - OL39935322M - OL29117373M - OL29117372M - OL29145417M - OL34492200M - OL39903136M - OL24061203M
- Online Computer Library Center (OCLC) ID: 251207719
- Library of Congress Control Number (LCCN): 2009026202
- All ISBNs: ➤ 1119277345 - 1118599608 - 9781119277316 - 9781118599600 - 9781118381526 - 9781119277347 - 9781299464865 - 9781848216600 - 1119277310 - 1118381548 - 1118381874 - 1848210949 - 111838153X - 9781118381878 - 1299464866 - 1119004721 - 9781118381540 - 1118381521 - 9781118381533 - 9781119004721 - 9781848210943 - 1848216602
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information warfare at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Engineering information security
By Stuart Jacobs

“Engineering information security” Metadata:
- Title: ➤ Engineering information security
- Author: Stuart Jacobs
- Language: English
- Number of Pages: Median: 784
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - Wiley-Interscience - Wiley-IEEE Press
- Publish Date: 2010 - 2011 - 2012 - 2015
- Publish Location: Hoboken, N.J
“Engineering information security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Information technology - Data protection - Computer networks, security measures - System design - Systems engineering
Edition Identifiers:
- The Open Library ID: ➤ OL38292432M - OL29281612M - OL24422622M - OL29065413M - OL29281517M - OL29057177M - OL39852465M - OL28293361M - OL48717427M - OL39880558M
- Library of Congress Control Number (LCCN): 2010028408
- All ISBNs: ➤ 1118009010 - 9781119101604 - 0470565128 - 1119104726 - 9780470947913 - 9781119104728 - 9780470565124 - 0470947918 - 1118353579 - 0470947837 - 1283138786 - 9781283138789 - 1119101603 - 1119104793 - 9781118353578 - 9781118009017 - 9781119104711 - 9781119104797 - 9780470947838 - 1119104718
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Engineering information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Electronic Voting
By Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira and Carsten Schürmann

“Electronic Voting” Metadata:
- Title: Electronic Voting
- Authors: ➤ Robert KrimmerMelanie VolkamerNadja Braun BinderNorbert KerstingOlivier PereiraCarsten Schürmann
- Language: English
- Number of Pages: Median: 243
- Publisher: ➤ Springer International Publishing AG - Springer
- Publish Date: ➤ 2017 - 2018 - 2019 - 2020 - 2021 - 2022 - 2023 - 2024
“Electronic Voting” Subjects and Themes:
- Subjects: ➤ Voting - Data encryption (computer science) - Data protection - Computer network architectures - Software engineering - Computer science
Edition Identifiers:
- The Open Library ID: ➤ OL28331280M - OL28226050M - OL34796847M - OL31904986M - OL54049910M - OL28219635M - OL49507456M - OL30177168M - OL39273945M
- All ISBNs: ➤ 9783031437557 - 9783319522395 - 9783319686868 - 9783030004187 - 303000418X - 3031159101 - 9783030603465 - 3031722434 - 9783031722431 - 3031437551 - 3030869415 - 3030603466 - 3319686860 - 3319522396 - 9783030306243 - 9783031159107 - 9783030869410 - 3030306240
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Electronic Voting at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.