Your search returned 13 results.

1.
Balancing privacy and free speech : unwanted attention in the age of social media / Mark Tunick.

by Tunick, Mark [aut].

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult; Publisher: London ; New York, N.Y. : Routledge, 2016Availability: Items available for loan: Main LibraryCall number: K564.C6 .T86 2014 (1), Female LibraryCall number: K564.C6 .T86 2014 (1).

2.
Comparative defamation and privacy law / edited by Andrew T. Kenyon.

by Kenyon, Andrew T [editor.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge, United Kingdom : Cambridge University Press, 2016Online access: Cover image Availability: Items available for loan: Main LibraryCall number: K3253.A6 .C658 2016 (1), Female LibraryCall number: K3253.A6 .C658 2016 (1).

3.
Confidentiality / R.G. Toulson M.A., LL. B., a lord justice of appeal and master of the bench of the Inner Temple, C.M. Phipps M.A., a barrister of the Middle Temple.

by Toulson, R. G | Phipps, C. M.

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London : Sweet & Maxwell, 2012Availability: Items available for loan: Main LibraryCall number: KD7518 .T68 2012 (1), Female LibraryCall number: KD7518 .T68 2012 (1).

4.
Ctrl + Z : the right to be forgotten / Meg Leta Jones.

by Jones, Meg Leta [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York ; London : New York University Press, [2016]Other title: Ctrl plus Z | Right to be forgotten.Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: K3264.C65 .J66 2016 (1), Female LibraryCall number: K3264.C65 .J66 2016 (1).

5.
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: First edition.Material type: Text Text; Format: print regular print ; Literary form: Not fiction Publisher: New York, N.Y. : W.W. Norton & Company, [2015]Online access: Table of contents | Click here to access online Availability: Items available for loan: Main LibraryCall number: HM846 .S362 2015 (1), Female LibraryCall number: HM846 .S362 2015 (1).

6.
Designing for privacy and related needs / Julie Stewart-Pollack and Rosemary Menconi.

by Stewart-Pollack, Julie | Menconi, Rosemary.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Fairchild Publ., 2005Availability: Items available for loan: Female LibraryCall number: NA2750 .S72 2005 (1).

7.
Exposed : desire and disobedience in the digital age / Bernard E. Harcourt.

by Harcourt, Bernard E, 1963-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge, Massachusetts : Harvard University Press, 2015Availability: Items available for loan: Main LibraryCall number: HM851 .H3664 2015 (1), Female LibraryCall number: HM851 .H3664 2015 (1).

8.
Privacy on the ground : driving corporate behavior in the United States and Europe / Kenneth A. Bamberger and Deirdre K. Mulligan.

by Bamberger, Kenneth A, 1968- [author.] | Mulligan, Deirdre K, 1966- [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge, Massachusetts : The MIT Press, [2015]Copyright date: ©2015Availability: Items available for loan: Main LibraryCall number: K3263 .B36 2015 (1), Female LibraryCall number: K3263 .B36 2015 (1).

9.
Protect your privacy : how to protect your identity as well as your financial, personal, and computer records in an age of constant surveillance / Duncan Long.

by Long, Duncan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Guilford, Conn. : Lyons Press, c2007Online access: Contributor biographical information | Publisher description | Sample text | Table of contents only Availability: Items available for loan: Main LibraryCall number: JC596.2 .U5 L664 2007 (1), Female LibraryCall number: JC596.2 .U5 L664 2007 (1).

10.
Reconstituting internet normativity : the role of State, private actors, global online community in the production of legal norms / Dimitrios Koukiadis.

by Koukiadis, Dimitrios [author.].

Edition: 1. edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Baden-Baden : Oxford : Nomos ; Hart Publishing, 2015Availability: Items available for loan: Main LibraryCall number: K564.C6 .K68 2015 (1), Female LibraryCall number: K564.C6 .K68 2015 (1).

11.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 P45 2007 (1), Female LibraryCall number: QA76.9 .A25 P45 2007 (1).

12.
SuperVision : an introduction to the surveillance society / John Gilliom and Torin Monahan.

by Gilliom, John, 1960- | Monahan, Torin.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Chicago : The University of Chicago Press, [2013]Availability: Items available for loan: Main LibraryCall number: TK7882.E2 .G55 2013 (1), Female LibraryCall number: TK7882.E2 .G55 2013 (1).

13.
Understanding developments in cyberspace law : leading lawyers on analyzing recent trends, case law, and legal strategies affecting the internet landscape.

by Aspatore, Inc.

Edition: 2013 ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: [Boston, Mass.] : Aspatore Books, ©2013Availability: Items available for loan: Main LibraryCall number: KF390.5 .U49 2013 (1), Female LibraryCall number: KF390.5 .U49 2013 (1).