Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Practical Data Security, Author: John Gordon

Pagination Links