Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Vulnerability Management, Author: Park Foreman
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Author: José A. Onieva
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings / Edition 1, Author: Yun Qing Shi
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Privacy Solutions and Security Frameworks in Information Protection, Author: Hamid Nemati
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Principles of Data Security, Author: Ernst L. Leiss

Pagination Links