Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Vulnerability Management, Author: Park Foreman
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: The Death of the Internet, Author: Markus Jakobsson
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Error Control, Cryptology, and Speech Compression: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers, Author: Andrew Chmora
Title: Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, Author: Ed Dawson
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, Author: Willem Jonker
Title: Guarding Your Business: A Management Approach to Security, Author: Manu Malek
Title: Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings, Author: Josef Pieprzyk
Title: Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, Author: Mauro Barni
Title: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, Author: Sokratis Katsikas
Title: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, Author: Ed Dawson
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Author: Damien Sauveron
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings, Author: Kwangjo Kim
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky
Title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Author: Ivan Damgard
Title: Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, Author: Kaushal Solanki

Pagination Links