Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Practical Data Security, Author: John Gordon
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein

Pagination Links