Library Logo

Your search returned 21 results. Subscribe to this search

|
1. Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings

by Pieprzyk, Josef; Seberry, Jennifer. -- ACISP '96 (1996 : Wollongong, N.S.W.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin ; New York : Springer, c1996Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 INF] (2).

2. Unpopular privacy [electronic resource] : what must we hide?

by Allen, Anita L.

Material type: book Book; Format: available online remote; Literary form: not fiction ; Audience: Specialized; Publisher: New York ; Oxford : Oxford University Press, c2011Online Access: Oxford scholarship online Availability: No items available

3. Owning up : privacy, property, and belonging in U.S. women's life writing / [electronic resource]

by Adams, Katherine.

Material type: book Book; Format: available online remote; Literary form: not fiction ; Audience: Specialized; Publisher: New York ; Oxford : Oxford University Press, 2009Online Access: Oxford scholarship online Availability: No items available

4. Privacy in peril [electronic resource]

by Rule, James B.

Material type: book Book; Format: available online remote; Literary form: not fiction ; Audience: Specialized; Publisher: Oxford : Oxford University Press, 2007Online Access: Oxford scholarship online Availability: No items available

5. Privacy and social freedom

by Schoeman, Ferdinand David.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Cambridge ; Cambridge Universitt, 1992Availability: Items available for loan: Dhaka University Library [323.44 SCP] (2). Items available for reference: Dhaka University Library [323.44 SCP] (1 ).

6. Privacy and freedom

by Westin, Alan F.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Atheneum, 1967Availability: Items available for loan: Dhaka University Library [323.44 WEP] (1).

7. The privacy advocates : resisting the spread of surveillance

by Bennett, Colin J.

Material type: book Book; Format: electronic ; Literary form: not fiction Publisher: Cambridge, MA : MIT Press, c2008Availability: Items available for loan: Dhaka University Library [323.4482 BEP] (1).

8. Constitutional issues in freedom of information : international and national perspectives

by Mustafa, Faizan.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Kanishka Publishers, 2003Availability: Items available for loan: Dhaka University Library [342.0853 MUC] (2).

9. Say it safely : legal limits in publishing, radio, and television

by Ashley, Paul Pritchard.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Seattle : University of Washington Press, 1969Availability: Items available for loan: Dhaka University Library [343.56 ASS] (1).

10. Privacy and the press : the law, the mass media, and the First amendment

by Pember, Don R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Seattle : University of Washington Press, 1972Availability: Items available for loan: Dhaka University Library [342.73085 PEP] (2).

11. Cybercrime : law enforcement, security and surveillance in the information age

by Thomas, Douglas; Loader, Brian.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London ; New York, N.Y. : Routledge, 2000Online Access: Publisher description | Contributor biographical information Availability: Items available for loan: Dhaka University Library [364.168 CYB] (1).

12. Ethical issues in journalism and the media

by Belsey, Andrew; Chadwick, Ruth F.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London : New York ; Routledge, 1992Availability: Items available for loan: Dhaka University Library [174.9097 EPH] (3).

13. Social information processing and statistical systems--change and reform

by Dunn, Edgar Streeter.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, 1974Availability: Items available for loan: Dhaka University Library [651.5 DUS] (2).

14. Risks & rights in publishing, television, radio, motion pictures, advertising, and the theater

by Spring, Samuel.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : W.W. Norton, c1952Availability: Items available for loan: Dhaka University Library [655.6 SPR] (2).

15. Security and privacy in computer systems

by Hoffman, Lance J.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Los Angeles : Melville Pub., 1973Availability: Items available for loan: Dhaka University Library [658.47 HOS] (1).

16. Public and private man in Shakespeare

by Gregson, J. M.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Totowa, N.J. : Barnes & Noble, 1983Availability: Items available for loan: Dhaka University Library [822.33 GRP] (1).

17. Who owns information? : from privacy to public access

by Branscomb, Anne W.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York, NY : BasicBooks, c1994Availability: Items available for reference: Dhaka University Library [347.302853 BRA] (1 ).

18. Cloud computing and electronic discovery / [electronic resource]

by Martin, James P; Cendrowski, Harry.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, New Jersey : John Wiley and Sons, [2014]Online Access: Wiley Online Library Availability: No items available

19. WHOIS running the Internet : protocol, policy, and privacy / [electronic resource]

by Bruen, Garth O.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, New Jersey : John Wiley and Sons, Inc., 2015.Online Access: Wiley Online Library Availability: No items available

20. Targeted cyber attacks : multi-staged attacks driven by exploits and malware / [electronic resource]

by Sood, Aditya K; Enbody, Richard J.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Amsterdam ; Syngress, 2014.Online Access: ScienceDirect Availability: No items available

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login