Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: The Executive MBA in Information Security, Author: Jr.
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Database Security XI: Status and Prospects, Author: T.Y. Lin
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Security and Privacy in Advanced Networking Technologies, Author: B.J.B. Jerman-Blazic
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham

Pagination Links