Title: Information Security - the Next Decade / Edition 1, Author: Jan H.P. Eloff
Title: Database Security IX: Status and prospects / Edition 1, Author: David L. Spooner
Title: Database Security X: Status and prospects / Edition 1, Author: Pierangela Samarati
Title: Convolutional Coding / Edition 1, Author: L H Charles Lee
Title: Database Security XII: Status and Prospects / Edition 1, Author: Sushil Jajodia
Title: Risk Management for Security Professionals / Edition 1, Author: Carl Roper
Title: Security Of Data And Transaction Processing / Edition 1, Author: Vijay Atluri
Title: Case Study of Security Problems and Their Solutions / Edition 1, Author: Gunner O. Klein
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA / Edition 1, Author: Vijay Atluri
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures / Edition 1, Author: Neil F. Johnson
Title: Data and Application Security: Developments and Directions / Edition 1, Author: B. Thuraisingham
Title: A Practical Guide to Security Engineering and Information Assurance / Edition 1, Author: Debra S. Herrmann
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada / Edition 1, Author: Martin S. Olivier
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination / Edition 1, Author: David Lyon
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK / Edition 1, Author: Ehud Gudes
Title: Investigator's Guide to Steganography / Edition 1, Author: Gregory Kipper
Title: Surviving Security: How to Integrate People, Process, and Technology / Edition 2, Author: Amanda Andress
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition / Edition 2, Author: Thomas R. Peltier

Pagination Links