Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Convolutional Coding, Author: L H Charles Lee
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier

Pagination Links