Technologies of inSecurity the surveillance of everyday life
| Main Authors: | Aas, Katja Franko (Author), Gundhus, Helene Oppen (Author), Lomell, Heidi Mork (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Abingdon [England];New York
Routledge-Cavendish
2009
|
| Subjects: | |
| Online Access: | NetLibrary |
Similar Items
Computer insecurity risking the system
by: Furnell, Steven
Published: (2005)
by: Furnell, Steven
Published: (2005)
Security studies a reader
by: Hughes, Christopher W., et al.
Published: (2011)
by: Hughes, Christopher W., et al.
Published: (2011)
Contemporary security studies
Published: (2013)
Published: (2013)
International security studies theory and practice
by: Hough, Peter 1967-, et al.
Published: (2015)
by: Hough, Peter 1967-, et al.
Published: (2015)
Job insecurity coping with jobs at risk
by: Hartley, Jean 1953-
Published: (1991)
by: Hartley, Jean 1953-
Published: (1991)
Understanding new security threats
Published: (2019)
Published: (2019)
Contemporary European security
Published: (2019)
Published: (2019)
US-ASEAN security co-operation limits and possibilities
by: Alagappa, Muthiah
Published: (1986)
by: Alagappa, Muthiah
Published: (1986)
Security an introduction
by: Purpura, Philip P. 1950-
Published: (2011)
by: Purpura, Philip P. 1950-
Published: (2011)
Security studies an introduction
by: Williams, Paul D. 1975-
Published: (2008)
by: Williams, Paul D. 1975-
Published: (2008)
Security journal
Published: (1991)
Published: (1991)
Wireless security models, threats and solutions
by: Nichols, Randall K., et al.
Published: (2002)
by: Nichols, Randall K., et al.
Published: (2002)
الامن القومي والامن الجماعي الدولي
by: كامل, ممدوح شوقي مصطفى
Published: (1985)
by: كامل, ممدوح شوقي مصطفى
Published: (1985)
U.S. security cooperation with Africa political and policy challenges
by: Griffiths, Robert J.
Published: (2016)
by: Griffiths, Robert J.
Published: (2016)
Butterworths security dictionary terms and concepts
by: Fay, John J.
Published: (1987)
by: Fay, John J.
Published: (1987)
Wireless security
by: Osterhage, Wolfgang
Published: (2012)
by: Osterhage, Wolfgang
Published: (2012)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Internal security Act 1960 (Act 82) [with notes on cases] practitioner's referencer
Published: (2003)
Published: (2003)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Implementing email security and tokens current standards, tools, and practices
by: Turner, Sean H., et al.
Published: (2008)
by: Turner, Sean H., et al.
Published: (2008)
Security technologies for the World Wide Web
by: Oppliger, Rolf
Published: (2000)
by: Oppliger, Rolf
Published: (2000)
The craft system security
by: Smith, Sean W. 1964-, et al.
Published: (2008)
by: Smith, Sean W. 1964-, et al.
Published: (2008)
Security of mobile communications
by: Boudriga, Noureddine
Published: (2010)
by: Boudriga, Noureddine
Published: (2010)
Internet security professional reference
by: Atkins, Derek
Published: (1997)
by: Atkins, Derek
Published: (1997)
Information security foundations, technology and applications
by: Ali Ismail Awad
Published: (2018)
by: Ali Ismail Awad
Published: (2018)
Multimedia security steganography and digital water marking techniques for protection of intellectual property
by: Lu, Chun-Shein
Published: (2005)
by: Lu, Chun-Shein
Published: (2005)
Internal Security Act 1960 (Act 82) & Akta Keselamatan 1960 (Akta 82) (law stated is as at 10 May 2010)
Published: (2010)
Published: (2010)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Security architecture design deployment and operations
by: King, Christopher M., et al.
Published: (2001)
by: King, Christopher M., et al.
Published: (2001)
Virtualization security protecting virtualized environments
by: Shackleford, Dave
Published: (2013)
by: Shackleford, Dave
Published: (2013)
Practical embedded security building secure resource-constrained systems
by: Stapko, Timothy
Published: (2008)
by: Stapko, Timothy
Published: (2008)
Mobile application security
by: Dwivedi, Himanshu, et al.
Published: (2010)
by: Dwivedi, Himanshu, et al.
Published: (2010)
Water security
Published: (2015)
Published: (2015)
CWSP guide to wireless security
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
Computer security
by: Gollmann, Dieter
by: Gollmann, Dieter
Security complete
Published: (2002)
Published: (2002)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Similar Items
-
Computer insecurity risking the system
by: Furnell, Steven
Published: (2005) -
Security studies a reader
by: Hughes, Christopher W., et al.
Published: (2011) -
Contemporary security studies
Published: (2013) -
International security studies theory and practice
by: Hough, Peter 1967-, et al.
Published: (2015) -
Job insecurity coping with jobs at risk
by: Hartley, Jean 1953-
Published: (1991)