Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton

Pagination Links