Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, Author: Ton Kalker
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers, Author: Giovanni Di Crescenzo
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Vulnerability Management, Author: Park Foreman
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton

Pagination Links