Showing 1 - 7 results of 7 for search 'Romanosky, Sasha', query time: 0.06s
Refine Results
-
1
Internet freedom software and illicit activity : supporting human rights without enabling criminals / by Romanosky, Sasha
Published 2015Call Number: Loading…Full Text (via JSTOR)
Located: Loading…
eBook -
2
Internet freedom software and illicit activity : supporting human rights without enabling criminals / by Romanosky, Sasha
Published 2015Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
3
Internet freedom software and illicit activity supporting human rights without enabling criminals / by Romanosky, Sasha
Published 2015Call Number: Loading…Online Access (A-Z Journals and Newspapers)
Located: Loading…
Electronic eBook -
4
Internet freedom software and illicit activity : supporting human rights without enabling criminals / by Romanosky, Sasha, Libicki, Martin C., Winkelman, Zev, Tkacheva, Olesya
Published 2015Call Number: Loading…Link to electronic resource
Located: Loading…
Book -
5
Consumer attitudes toward data breach notifications and loss of personal information / by Ablon, Lillian, Heaton, Paul, 1978-, Lavery, Diana Catherine, Romanosky, Sasha
Published 2016Call Number: Loading…Link to electronic version
Located: Loading…
Book -
6
Consumer attitudes toward data breach notifications and loss of personal information by Ablon, Lillian, Heaton, Paul, 1978-, Lavery, Diana Catherine, Romanosky, Sasha
Published 2016Call Number: Loading…Online Access (A-Z Journals and Newspapers)
Located: Loading…
Electronic eBook -
7
The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems by Mell, Peter
Published 2007Other Authors:Call Number: Loading…Online Access
Located: Loading…
Online Access
Government Document Electronic eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer crimes
Freedom of information
Human rights
Internet
Internet access
Moral and ethical aspects
Prevention
Computer security
Consumer protection
Data protection
Disclosure of information
Identity theft
Attitudes
Computer system failures
Consumers
Customer relations
Evaluation
Forecasting
Information technology
Management
Public opinion