Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Small Business Cyber Security: Your Customers Can Trust You...Right?, Author: Adam Anderson
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Mobile Agents and Security, Author: Giovanni Vigna
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Digital Rights Management: Protecting and Monetizing Content, Author: Joan Van Tassel
Title: Anonymity, Author: Alison Macrina
Explore Series
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton

Pagination Links