Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings / Edition 1, Author: Vijav Varadharajan
Title: Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / Edition 1, Author: Lynn Batten
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Investigator's Guide to Steganography / Edition 1, Author: Gregory Kipper
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management / Edition 1, Author: David B Little
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA / Edition 1, Author: Vijay Atluri
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings / Edition 1, Author: Yun Qing Shi
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings / Edition 1, Author: Kwangjo Kim
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers / Edition 1, Author: Giovanni Di Crescenzo
Title: Database Security XII: Status and Prospects / Edition 1, Author: Sushil Jajodia
Title: Surviving Security: How to Integrate People, Process, and Technology / Edition 2, Author: Amanda Andress
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain / Edition 1, Author: Csilla Farkas
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Secure Data Management in Decentralized Systems / Edition 1, Author: Ting Yu
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings / Edition 1, Author: Sushil Jajodia

Pagination Links