Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings, Author: Sokratis Katsikas
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings, Author: George Davida
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, Author: Sokratis Katsikas
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab

Pagination Links