Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Digital Preservation, Author: Marilyn Deegan
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Anonymity, Author: Alison Macrina
Explore Series
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham

Pagination Links