Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings, Author: Sokratis Katsikas
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings, Author: George Davida
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, Author: Gilles Barthe
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Personal Medical Information: Security, Engineering, and Ethics, Author: Ross Anderson
Title: Informed Watermarking, Author: Joachim Eggers
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez

Pagination Links