Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Convolutional Coding, Author: L H Charles Lee
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Informed Watermarking, Author: Joachim Eggers
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy

Pagination Links