Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation, Author: Antoon Bosselaers
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Author: Vijay Atluri
Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, Author: Lars Knudsen
Title: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Author: José A. Onieva
Title: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings, Author: Josep Domingo-Ferrer
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Author: Damien Sauveron
Title: Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers, Author: Tomas Sander
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Security and Privacy in Mobile Social Networks, Author: Xiaohui Liang

Pagination Links