Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Database Security XI: Status and Prospects, Author: T.Y. Lin
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Database Security IX: Status and prospects, Author: David L. Spooner
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez

Pagination Links