Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Security and Privacy in Mobile Social Networks, Author: Xiaohui Liang
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Practical Data Security, Author: John Gordon
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
Audiobook (Unabridged) $25.00
. Price is $25.0 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, Author: Gilles Barthe
Title: Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings, Author: Colin Boyd
Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Database Theory and Application: International Conference, DTA 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009, Proceedings, Author: Dominik Slezak
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson

Pagination Links