Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Convolutional Coding, Author: L H Charles Lee
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Advances In Artificial Intelligence For Privacy Protection And Security, Author: Agusti Solanas
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod

Pagination Links