Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Database Security XI: Status and Prospects, Author: T.Y. Lin
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Practical Data Security, Author: John Gordon
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Vulnerability Management, Author: Park Foreman
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez

Pagination Links