Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings, Author: Sokratis Katsikas
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings, Author: George Davida
Title: Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, Author: Angelos D. Keromytis
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, Author: Kaushal Solanki
Title: Guarding Your Business: A Management Approach to Security, Author: Manu Malek
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings, Author: Huaxiong Wang
Title: Protecting Oracle Database 12c, Author: Paul Wright
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Author: Damien Sauveron
Title: Digital Rights Management: Technological, Economic, Legal and Political Aspects, Author: Eberhard Becker
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton

Pagination Links