Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Informed Watermarking, Author: Joachim Eggers
Title: Convolutional Coding, Author: L H Charles Lee
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton

Pagination Links