Title: Vulnerability Management, Author: Park Foreman
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings, Author: Huaxiong Wang
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Case Study of Security Problems and Their Solutions, Author: Gunner O. Klein
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, Author: Ed Dawson
Title: Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, Author: Josef Pieprzyk
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Data Transportation and Protection, Author: John E. Hershey

Pagination Links