Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management, Author: David B Little
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby

Pagination Links