Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Practical Data Security, Author: John Gordon
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Convolutional Coding, Author: L H Charles Lee
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Database Security X: Status and prospects, Author: Pierangela Samarati
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton

Pagination Links