Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Author: Ivan Damgard
Title: Protecting Oracle Database 12c, Author: Paul Wright
Title: Trust and Privacy in Digital Business: Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, Author: Simone Fischer-Hübner
Title: Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, Author: Mauro Barni
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Research Directions in Database Security, Author: Teresa F. Lunt
Title: Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, Author: Willem Jonker
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, Author: Ed Dawson
Title: Digital Rights Management: Technological, Economic, Legal and Political Aspects, Author: Eberhard Becker

Pagination Links