Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, Author: Willem Jonker
Title: Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, Author: Mauro Barni
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, Author: James Bone
Explore Series
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, Author: Kim Sehun
Title: Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Author: Vijay Atluri
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, Author: Sushil Jajodia
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer

Pagination Links