Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings, Author: Sokratis Katsikas
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings, Author: George Davida
Title: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, Author: Sokratis Katsikas
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, Author: Gilles Barthe
Title: Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings, Author: Josef Pieprzyk
Title: Personal Medical Information: Security, Engineering, and Ethics, Author: Ross Anderson
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Mobile Agents and Security, Author: Giovanni Vigna
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers, Author: Giovanni Di Crescenzo
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton

Pagination Links