Title: Information Processing and Security Systems, Author: Khalid Saeed
Title: Optical and Digital Techniques for Information Security, Author: Bahram Javidi
Title: Information Security: A Strategic Approach, Author: Vincent LeVeque
Title: Information Risk and Security: Preventing and Investigating Workplace Computer Crime, Author: Edward Wilding
Title: Quality Of Protection: Security Measurements and Metrics, Author: Dieter Gollmann
Title: Information Security Cost Management, Author: Ioana V. Bazavan
Title: Critical Information Infrastructures Security: First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006, Author: Javier Lopez
Title: Elsevier's Dictionary of Information Security, Author: G. Manoilov
Title: Security Metrics: Replacing Fear, Uncertainty, and Doubt, Author: Andrew Jaquith
Title: Security Metrics, Author: Andrew Jaquith
Title: New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, Author: Hein Venter
Title: Implementing the ISO/IEC 27001 Information Security Management System Standard, Author: Edward Humphreys
Title: How to Achieve 27001 Certification: An Example of Applied Compliance Management, Author: Sigurjon Thor Arnason
Title: How to Achieve 27001 Certification: An Example of Applied Compliance Management, Author: Sigurjon Thor Arnason
Title: Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, Author: Yi Mu
Title: Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, Author: Dingyi Pei
Title: Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings, Author: Reihaneh Safavi-Naini
Title: Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, Author: W. Krag Brotby
Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: Information Security Management Handbook, Volume 3, Author: Harold F. Tipton

Pagination Links