Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Data Selves: More-than-Human Perspectives / Edition 1, Author: Deborah Lupton
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Case Study of Security Problems and Their Solutions / Edition 1, Author: Gunner O. Klein
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: SAP HANA Security Guide / Edition 1, Author: Jonathan Haun
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Risk Management for Security Professionals / Edition 1, Author: Carl Roper
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Information Security Governance: A Practical Development and Implementation Approach / Edition 1, Author: Krag Brotby
Title: Informed Watermarking, Author: Joachim Eggers
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan

Pagination Links