Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, Author: Lars Knudsen
Title: Effective Oracle Database 10g Security by Design, Author: David Knox
Title: Digital Preservation, Author: Marilyn Deegan
Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993, Author: Bhavani Thuraisingham
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, Author: Ed Dawson
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management, Author: David B Little
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Mobile Agents and Security, Author: Giovanni Vigna
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier

Pagination Links