Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Convolutional Coding, Author: L H Charles Lee
Title: Database Security XI: Status and Prospects, Author: T.Y. Lin
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier
Title: Informed Watermarking, Author: Joachim Eggers
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Computer And Intrusion Forensics, Author: George Mohay

Pagination Links