Incoming Resources
- Data governance in AI, fintech and legaltech, law and regulation in the financial sector, edited by Joseph Lee and Aline Darbellay
- Technocreep, the surrender of privacy and the capitalization of intimacy, Thomas P. Keenan
- Internet and surveillance, the challenges of Web 2.0 and social media, edited by Christian Fuchs ... [and three others]
- Understanding cyber risk, protecting your corporate assets, Thomas R. Koehler
- Data Privacy and Trust in Cloud Computing, Building trust in the cloud through assurance and accountability, edited by Theo Lynn, John G. Mooney, Lisa van der Werff, Grace Fox
- Social Network Analysis and Law Enforcement, Applications for Intelligence Analysis, by Morgan Burcher
- Cyber Technological Paradigms and Threat Landscape in India, by Ramnath Reghunadhan
- Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems, The Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP), edited by Yang Xu, Yongbin Sun, Yanyang Liu, Feng Gao, Pengfei Gu, Zheming Liu
- Managing Risk and Information Security, Protect to Enable, by Malcolm Harkins
- 99 privacy breaches to beware of, practical data protection tips from real-life experiences, Kevin Shepherdson, William Hioe & Lyn Boxall
- Managing cyber risk in the financial sector, lessons from Asia, Europe and the USA, edited by Ruth Taplin
- Creativity comes at a price, the role of collecting societies, [editor and coordinator, Susanne Nikoltchev]
- Cryptography and data security, Dorothy Elizabeth Robling Denning
- Net zeros and ones, how data erasure promotes sustainability, privacy, and security, Richard Stiennon, Russ B. Ernst, Fredrik Forslund ; [foreword by Mikko Hyppönen]
- Smart TV and data protection, Britt van Breda, Nico van Eijk, Kristina Irion, Tarlach McGonagle, Sander van Voorst
- Managing and sharing research data, a guide to good practice, Louise Corti, Veerle Van den Eynden, Libby Bishop & Matthew Woollard
- Facing cyber threats head on, protecting yourself and your business, Brian Minick
- Intel Trusted Execution Technology for Server Platforms, A Guide to More Secure Datacenters, by William Futral, James Greene
- Modern data protection, ensuring recoverability of all modern workloads, W. Curtis Preston
- Open banking, edited by Linda Jeng
- Unauthorized Access, The Crisis in Online Privacy and Security, Robert Sloan
- The Privacy Engineer's Manifesto, Getting from Policy to Code to QA to Value, by Michelle Dennedy, Jonathan Fox, Tom Finneran
- Beyond data protection, strategic case studies and practical guidance, edited by Noriswadi Ismail, Edwin Lee Yong Cieh
- Surveillance, power and modernity, bureaucracy and discipline from 1700 to the present day, Christopher Dandeker
- The Future of Financial Systems in the Digital Age, Perspectives from Europe and Japan, edited by Markus Heckel, Franz Waldenberger
- Cyber security awareness for CEOs and management, David Willson ; contributing editor, Henry Dalziel
- Data governance, value orders and jurisdictional conflicts, Anke Sophia Obendiek
- Trading in Local Energy Markets and Energy Communities, Concepts, Structures and Technologies, edited by Miadreza Shafie-khah, Amin Shokri Gazafroudi
- Privacy vs. security, Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan
- Managing Risk and Information Security, Protect to Enable, by Malcolm W. Harkins
- Law, policy, and technology, cyberterrorism, information warfare, and Internet immobilization, Pauline C. Reich and Eduardo Gelbstein, editors
- Information Retrieval and Natural Language Processing, A Graph Theory Approach, by Sheetal S. Sonawane, Parikshit N. Mahalle, Archana S. Ghotkar
- The chief data officer's playbook, Caroline Carruthers and Peter Jackson
- Security in Computer and Information Sciences, First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, edited by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis K. Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras
- Managing information risks, threats, vulnerabilities, and responses, William Saffady
- Blockchain, Law and Governance, edited by Benedetta Cappiello, Gherardo Carullo
- Cognitive hack, the new battleground in cybersecurity... the human mind, James Bone
- New Energy Power Generation Automation and Intelligent Technology, Proceedings of the Seventh Seminar on Digital Instrumentation and Control Technology for Nuclear Power Plant, edited by Pengfei Gu, Yang Xu, Weihua Chen, Rigang Chen, Yongbin Sun, Zheming Liu
- Surveillance studies, an overview, David Lyon
- A Practical Guide to TPM 2.0, Using the Trusted Platform Module in the New Age of Security, by Will Arthur, David Challener
- Surveillance after Snowden, David Lyon
- Ethics, law and governance of biobanking, national, European and international approaches, Deborah Mascalzoni, editor
- Cybersecurity law, disciplina italiana ed europea della sicurezza cibernetica anche alla luce delle norme tecniche, a cura di Alfonso Contaldo e Davide Mula ; introduzione di Giuseppe Busia
- Auditing corporate surveillance systems, research methods for greater transparency, Isabel Wagner
- The Palgrave Handbook of International Cybercrime and Cyberdeviance
- Libertà vigilata, privacy, sicurezza e mercato nella rete, Franco Bernabé
- Energy Resilience and Climate Protection, Energy systems, critical infrastructures, and sustainability goals, by Heinz-Adalbert Krebs, Patricia Hagenweiler
- Digital rights management, business and technology, William Rosenblatt, William Trippe, and Stephen Mooney
- Cyber Criminology, edited by Hamid Jahankhani
- Information protection and other unnatural acts, every manager's guide to keeping vital computer data safe and sound, Harry B. DeMaio