Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Practical Data Security, Author: John Gordon
Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing

Pagination Links