Books on the topic 'Unauthorised access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 books for your research on the topic 'Unauthorised access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Unauthorised access: Physical penetration testing for IT security teams. Chichester, West Sussex, U.K: Wiley, 2009.
Find full textCommission, South African Law. Computer-related crime: Preliminary proposal for reform in respect of unauthorised access to computers, unauthorised modification of computer data and software applications and related procedural aspects. [Pretoria: The Commission, 2001.
Find full textWoodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.
Find full textRights, United States Congress House Committee on the Judiciary Subcommittee on Civil and Constitutional. Unauthorized access to individual medical records: Hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, second session, on H.R. 5831 ... August 9, 1984. Washington: U.S. G.P.O., 1986.
Find full textUnited States. Congress. Senate. A bill to provide individuals with access to health information of which they are a subject, ensure personal privacy with respect to health-care-related information, impose criminal and civil penalties for unauthorized use of protected health information, to provide for the strong enforcement of these rights, and to protect States' rights. Washington, D.C: U.S. G.P.O., 1999.
Find full textAllsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.
Find full textAllsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2009.
Find full textUnauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.
Find full textCommission, South African Law, ed. Computer related crime: Options for reform in respect of unauthorised access to computers, unauthorised modification of computer data, and software applications and related procedural aspects. [Pretoria]: The Commission, 1998.
Find full textSloan, Robert H., and Richard Warner. Unauthorized Access. CRC Press, 2016. http://dx.doi.org/10.1201/b15148.
Full textWarner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.
Find full textSloan, Robert. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis, 2014.
Find full textWarner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.
Find full textWarner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.
Find full textSloan, Robert. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis, 2017.
Find full textWarner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.
Find full textUnauthorized Aliens and Noncitizens: Access and Eligibility to Federal Benefits. Nova Science Pub Inc, 2014.
Find full textArgyrakis, Andy. Eminem: Access : The Unauthorized Digital Biography of Eminem : The Narrated Story of the Band (Interview Series). Wheezy Multimedia, 2002.
Find full textOffice, General Accounting. Aviation security: Improved controls needed to prevent unauthorized access at key airports : report to the Secretary of Transportation. Washington, D.C: The Office, 1988.
Find full textFlanigan, Jessica. Medical Autonomy and Modern Healthcare. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190684549.003.0007.
Full textPublic Service Commission of Canada., ed. Audit of possible unauthorized access to Public Service Commission second language evaluation tests by the Nec Plus Ultra language school: A report. Ottawa: Public Service Commission of Canada, 2009.
Find full textPublic Service Commission of Canada., ed. Audit of possible unauthorized access to Public Service Commission second language evaluation tests by the Nec Plus Ultra language school: A report. Ottawa: Public Service Commission of Canada, 2009.
Find full textUnited States. General Accounting Office, ed. Computer security: Unauthorized access to a NASA scientific network : report to the chairman, Committee on Science, Space, and Technology, House of Representatives. Washington, D.C: The Office, 1989.
Find full textLabat, Patricio Grané, and Naomi Burke. The Protection of Diplomatic Correspondence in the Digital Age. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795940.003.0013.
Full textFederal family education loan information system: Weak computer controls increase risk of unauthorized access to sensitive data : report to the Secretary of Education. Washington, D.C: The Office, 1995.
Find full textWard, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.
Full text