Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Surveillance Studies: An Overview, Author: David Lyon

Pagination Links