Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings, Author: Sokratis Katsikas
Title: Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings, Author: Vijav Varadharajan
Title: Digital Rights Management: Technological, Economic, Legal and Political Aspects, Author: Eberhard Becker
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, Author: Sokratis Katsikas
Title: Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings, Author: Lynn Batten
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings, Author: Kwangjo Kim
Title: Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings, Author: Colin Boyd
Title: Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings, Author: Andreas Pfitzmann
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers, Author: Giovanni Di Crescenzo
Title: Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Author: Vijay Atluri

Pagination Links