Title: Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, Author: Mauro Barni
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings, Author: Huaxiong Wang
Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, Author: Gilles Barthe
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings, Author: Liqun Chen
Title: Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, Author: Joan Feigenbaum
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Mobile Agents and Security, Author: Giovanni Vigna
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns

Pagination Links