Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: The CISO Handbook: A Practical Guide to Securing Your Company / Edition 1, Author: Michael Gentile
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, Author: Hamid Nemati
Title: Surviving Security: How to Integrate People, Process, and Technology / Edition 2, Author: Amanda Andress
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination / Edition 1, Author: David Lyon
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions, Author: Ephrem Eyob
Title: Security Solutions for Hyperconnectivity and the Internet of Things, Author: Maurice Dawson
Title: Security Of Data And Transaction Processing / Edition 1, Author: Vijay Atluri
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: Secure Data Management in Decentralized Systems / Edition 1, Author: Ting Yu
Title: SAP HANA Security Guide / Edition 1, Author: Jonathan Haun
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Risk Management for Security Professionals / Edition 1, Author: Carl Roper
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez

Pagination Links