Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, Author: Jessica Fridrich
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, Author: Joan Feigenbaum
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, Author: Kim Sehun
Title: Practical Data Security, Author: John Gordon
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Author: Ivan Damgard
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu

Pagination Links