Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Case Study of Security Problems and Their Solutions, Author: Gunner O. Klein
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, Author: James Bone
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Convolutional Coding, Author: L H Charles Lee
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton

Pagination Links