Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Informed Watermarking, Author: Joachim Eggers

Pagination Links