Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Vulnerability Management, Author: Park Foreman
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: The Economic Costs and Implications of High-Technology Hardware Theft, Author: James N. Dertouzos
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter
Title: Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, Author: Fabien A. P. Petitcolas
Title: Principles of Data Security, Author: Ernst L. Leiss
Title: Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France, Author: Yves Deswarte
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Personal Medical Information: Security, Engineering, and Ethics, Author: Ross Anderson
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Trust and Privacy in Digital Business: Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, Author: Simone Fischer-Hübner
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Advances In Computer System Security, Vol. 3, Author: Rein Turn
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt

Pagination Links