Title: Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, Author: Joan Feigenbaum
Title: The Executive MBA in Information Security, Author: Jr.
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Digital Rights Management for E-Commerce Systems, Author: Lambros Drossos
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, Author: Yun Qing Shi
Title: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings, Author: David Aucsmith
Title: Database Security XI: Status and Prospects, Author: T.Y. Lin
Title: Vulnerability Management, Author: Park Foreman
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Audiobook (Unabridged) $27.99
. Price is $27.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Database Security X: Status and prospects, Author: Pierangela Samarati

Pagination Links