Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings, Author: Lynn Batten
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Author: José A. Onieva
Title: Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, Author: Willem Jonker
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Author: Ivan Damgard
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, Author: Ed Dawson
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress

Pagination Links