Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Investigator's Guide to Steganography / Edition 1, Author: Gregory Kipper
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management / Edition 1, Author: David B Little
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA / Edition 1, Author: Vijay Atluri
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Database Security XII: Status and Prospects / Edition 1, Author: Sushil Jajodia
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain / Edition 1, Author: Csilla Farkas
Title: Secure Data Management in Decentralized Systems / Edition 1, Author: Ting Yu
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Data and Application Security: Developments and Directions / Edition 1, Author: B. Thuraisingham
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures / Edition 1, Author: Neil F. Johnson
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Data and Applications Security XVII: Status and Prospects / Edition 1, Author: Sabrina De Capitani di Vimercati

Pagination Links