Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management, Author: David B Little
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Convolutional Coding, Author: L H Charles Lee
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab

Pagination Links