Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, Author: Kijoon Chae
Title: Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers, Author: Jan Camenisch
Title: Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings, Author: Vijav Varadharajan
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings, Author: Huaxiong Wang
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Oracle Data Guard 11g Handbook, Author: Sonya Carothers
Title: Research Directions in Database Security, Author: Teresa F. Lunt

Pagination Links