Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Visions of Privacy: Policy Choices for the Digital Age / Edition 1, Author: Colin J. Bennett
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai

Pagination Links