Title: Advances In Computer System Security, Vol. 3, Author: Rein Turn
Title: Convolutional Coding, Author: L H Charles Lee
Title: The Economic Costs and Implications of High-Technology Hardware Theft, Author: James N. Dertouzos
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Effective Oracle Database 10g Security by Design, Author: David Knox
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Effective Oracle Database 10g Security by Design, Author: David Knox

Pagination Links