Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Visions of Privacy: Policy Choices for the Digital Age / Edition 1, Author: Colin J. Bennett
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo

Pagination Links