Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Research Directions in Database Security, Author: Teresa F. Lunt
Title: Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France, Author: Yves Deswarte
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, Author: Lars Knudsen
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Author: Ivan Damgard
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy

Pagination Links