Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Practical Data Security, Author: John Gordon
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, Author: James Bone
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez

Pagination Links