Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Oracle Data Guard 11g Handbook / Edition 1, Author: Larry Carpenter
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions / Edition 1, Author: Andrei Mikhailovsky
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Informed Watermarking, Author: Joachim Eggers
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation / Edition 1, Author: Antoon Bosselaers
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1, Author: Damien Sauveron
Title: Implementing Database Security and Auditing / Edition 1, Author: Ron Ben Natan
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, Author: Ed Dawson
Title: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings, Author: David Aucsmith
Title: Guarding Your Business: A Management Approach to Security, Author: Manu Malek
Title: Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / Edition 1, Author: Lynn Batten
Title: Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers / Edition 1, Author: Tomas Sander
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings / Edition 1, Author: Huaxiong Wang

Pagination Links