Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Oracle Data Guard 11g Handbook / Edition 1, Author: Larry Carpenter
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions / Edition 1, Author: Andrei Mikhailovsky
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France, Author: Yves Deswarte
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Principles of Data Security, Author: Ernst L. Leiss
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings / Edition 1, Author: Yun Qing Shi
Title: Privacy and Capitalism in the Age of Social Media / Edition 1, Author: Sebastian Sevignani
Title: Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings / Edition 1, Author: Willem Jonker
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind / Edition 1, Author: James Bone
Title: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings, Author: David Aucsmith
Title: Information Security Governance: A Practical Development and Implementation Approach / Edition 1, Author: Krag Brotby
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering / Edition 1, Author: Nii O. Attoh-Okine

Pagination Links