Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Oracle Data Guard 11g Handbook / Edition 1, Author: Larry Carpenter
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions / Edition 1, Author: Andrei Mikhailovsky
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Mobile Agents and Security, Author: Giovanni Vigna
Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Data and Applications Security XVII: Status and Prospects / Edition 1, Author: Sabrina De Capitani di Vimercati
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Security Solutions for Hyperconnectivity and the Internet of Things, Author: Maurice Dawson
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings / Edition 1, Author: Liqun Chen
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan

Pagination Links