Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Convolutional Coding / Edition 1, Author: L H Charles Lee
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Database Security XI: Status and Prospects, Author: T.Y. Lin
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK / Edition 1, Author: Ehud Gudes
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Privacy Solutions and Security Frameworks in Information Protection, Author: Hamid Nemati
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Innovative Solutions for Access Control Management, Author: Ahmad Kamran Malik
Title: Online Banking Security Measures and Data Protection, Author: Shadi A. Aljawarneh
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering / Edition 1, Author: Nii O. Attoh-Okine
Title: Managing Cyberecurity Resources: A Financial Perspective, Author: Martin P. Loeb

Pagination Links