Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Vulnerability Management, Author: Park Foreman
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, Author: Jessica Fridrich
Title: Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, Author: Mauro Barni
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic

Pagination Links