Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, Author: Gilles Barthe
Title: Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, Author: Joan Feigenbaum
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings, Author: Kwangjo Kim
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Digital Rights Management: Protecting and Monetizing Content, Author: Joan Van Tassel
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, Author: Mauro Barni
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Digital Rights Management: Technological, Economic, Legal and Political Aspects, Author: Eberhard Becker
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo

Pagination Links