Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Author: José A. Onieva
Title: Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, Author: Angelos D. Keromytis
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Author: Vijay Atluri
Title: The Executive MBA in Information Security, Author: Jr.
Title: Privacy and Data Protection Law in Ireland, Author: Denis Kelleher
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger

Pagination Links