Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings, Author: Andreas Pfitzmann
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings, Author: Liqun Chen
Title: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings, Author: Josep Domingo-Ferrer
Title: Effective Oracle Database 10g Security by Design, Author: David Knox
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca

Pagination Links