Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan

Pagination Links