Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Vulnerability Management, Author: Park Foreman
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Data Selves: More-than-Human Perspectives / Edition 1, Author: Deborah Lupton
Title: Understanding and Applying Cryptography and Data Security / Edition 1, Author: Adam J. Elbirt
Title: Information Security Management Handbook, Volume 2 / Edition 6, Author: Harold F. Tipton
Title: Surviving Security: How to Integrate People, Process, and Technology / Edition 2, Author: Amanda Andress
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Building Trustworthy Semantic Webs / Edition 1, Author: Bhavani Thuraisingham
Title: A Practical Guide to Security Engineering and Information Assurance / Edition 1, Author: Debra S. Herrmann

Pagination Links