Title: Cybersecurity for SCADA Systems, Author: William Shaw
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, Author: Joan Feigenbaum
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Informed Watermarking, Author: Joachim Eggers
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier
Title: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings, Author: Liqun Chen
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, Author: Yun Qing Shi
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy

Pagination Links