Title: Small Business Cyber Security: Your Customers Can Trust You...Right?, Author: Adam Anderson
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: The Economic Costs and Implications of High-Technology Hardware Theft, Author: James N. Dertouzos
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Visions of Privacy: Policy Choices for the Digital Age / Edition 1, Author: Colin J. Bennett
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul

Pagination Links