Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Building Trustworthy Semantic Webs / Edition 1, Author: Bhavani Thuraisingham
Title: The Death of the Internet / Edition 1, Author: Markus Jakobsson
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings / Edition 1, Author: Sushil Jajodia
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Implementing Database Security and Auditing / Edition 1, Author: Ron Ben Natan
Title: Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / Edition 1, Author: Mauro Barni
Title: Guarding Your Business: A Management Approach to Security, Author: Manu Malek
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers / Edition 1, Author: Giovanni Di Crescenzo
Title: Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings, Author: Vijay Varadharajan
Title: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, Author: Lars Knudsen
Title: Principles of Data Security, Author: Ernst L. Leiss
Title: Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / Edition 1, Author: Kijoon Chae
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Security and Privacy in Mobile Social Networks, Author: Xiaohui Liang
Title: Information Security Management Handbook, Volume 2 / Edition 6, Author: Harold F. Tipton
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger

Pagination Links