Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Convolutional Coding, Author: L H Charles Lee
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Case Study of Security Problems and Their Solutions, Author: Gunner O. Klein
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier
Title: Informed Watermarking, Author: Joachim Eggers
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic

Pagination Links