Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA / Edition 1, Author: Vijay Atluri
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions, Author: Ephrem Eyob
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Database and Applications Security: Integrating Information Security and Data Management / Edition 1, Author: Bhavani Thuraisingham
Title: Analyzing and Securing Social Networks / Edition 1, Author: Bhavani Thuraisingham
Title: Data and Applications Security XVII: Status and Prospects / Edition 1, Author: Sabrina De Capitani di Vimercati
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Information Security: Design, Implementation, Measurement, and Compliance / Edition 1, Author: Timothy P. Layton
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Decentralized Computing Using Block Chain Technologies and Smart Contracts: Emerging Research and Opportunities, Author: S. Asharaf

Pagination Links