Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, Author: James Bone
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: SAP HANA Security Guide, Author: Jonathan Haun

Pagination Links