Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, Author: Sushil Jajodia
Title: Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, Author: Angelos D. Keromytis
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Oracle Data Guard 11g Handbook, Author: Sonya Carothers
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, Author: Kaushal Solanki
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings, Author: Lynn Batten
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz

Pagination Links