Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Practical Data Security, Author: John Gordon
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang

Pagination Links