Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, Author: Sushil Jajodia
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings, Author: David Aucsmith
Title: Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings, Author: Colin Boyd
Title: Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings, Author: Vijav Varadharajan
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll

Pagination Links