Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada / Edition 1, Author: Martin S. Olivier
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions, Author: Ephrem Eyob
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy

Pagination Links