Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures / Edition 1, Author: Neil F. Johnson
Title: Advances in Computers: Information Security, Author: Marvin Zelkowitz Ph.D.
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination / Edition 1, Author: David Lyon
Title: Database Security XII: Status and Prospects / Edition 1, Author: Sushil Jajodia
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition / Edition 2, Author: Thomas R. Peltier
Title: Case Study of Security Problems and Their Solutions / Edition 1, Author: Gunner O. Klein
Title: Understanding and Applying Cryptography and Data Security / Edition 1, Author: Adam J. Elbirt
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings / Edition 1, Author: Lynn Batten
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1, Author: Damien Sauveron
Title: Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers / Edition 1, Author: Jan Camenisch
Title: Personal Medical Information: Security, Engineering, and Ethics / Edition 1, Author: Ross Anderson
Title: Psychosocial Dynamics of Cyber Security / Edition 1, Author: Stephen J Zaccaro
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: The CISO Handbook: A Practical Guide to Securing Your Company / Edition 1, Author: Michael Gentile
Title: Oracle Data Guard 11g Handbook / Edition 1, Author: Larry Carpenter
Title: Database Security and Auditing: Protecting Data Integrity and Accessibility / Edition 1, Author: Hassan A. Afyouni
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger
Title: Analyzing and Securing Social Networks / Edition 1, Author: Bhavani Thuraisingham

Pagination Links