|
Information Security
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryBeginner's guide to improving online security Williams, Margot Article 2014 Investigative journalists like the members of ICIJ are facing growing concerns about security. Our members often work with leaks or other materials requiring protection of sources, collaborate across ... The Other Police State: Private Cops vs. the Public Good Rosen, David Article 2013 A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security... The Secret Secret: Of Wikileaks and Literacy Johnson, Jimmy Article 2010 Only those with proper clearances can participate in discussions that affect significant aspects of our lives. Certain technological achievements, our collective ethical decisions (torture, secret pri... |