Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France, Author: Yves Deswarte
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Mobile Agents and Security, Author: Giovanni Vigna
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, Author: Kim Sehun
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Author: José A. Onieva
Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Convolutional Coding, Author: L H Charles Lee
Title: Error Control, Cryptology, and Speech Compression: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers, Author: Andrew Chmora
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel

Pagination Links