Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Practical Data Security, Author: John Gordon
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez

Pagination Links