Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Information Security Management Handbook, Author: Harold F. Tipton

Pagination Links