Catalogue

Search Results

Catalogue Search

Additional search filters and navigation

Preferred library: Mackenzie Public Library? Results 1 - 10 of 11 (page 1 of 2)
Baseline Cyber Security Controls for Small and Medium Organizations.
Joint Report on Publicly Available Hacking Tools.
Top 10 It Security Actions : #6 Provide Tailored Cyber Security Training ITSM.10.093.
Safeguarding Privacy on Mobile Devices   .
Biometric encryption [electronic resource] : a positive-sum technology that achieves strong authentication, security and privacy / Ann Cavoukian, Alex Stoianov.
Privacy by Design Solutions for Biometric One-To-Many Identification Systems   .
Privacy by design solutions for biometric one-to-many identification systems / Ann Cavoukian, Alex Stoianov.
Calculating Robustness for Boundary Controls : ITSP.80.032.
Is a Bring Your Own Device (BYOD) Program the Right Choice for Your Organization? : Privacy and security risks of a BYOD program.
Fingerprint biometrics [electronic resource] : address privacy before deployment / Ann Cavoukian.

Search Results Facets

Search Results List

Additional Resources