Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Convolutional Coding, Author: L H Charles Lee
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management, Author: David B Little
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya

Pagination Links