Title: Data Transportation and Protection, Author: John E. Hershey
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Author: Damien Sauveron
Title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Author: Ivan Damgard
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Informed Watermarking, Author: Joachim Eggers
Title: Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, Author: Fabien A. P. Petitcolas

Pagination Links