Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security - the Next Decade, Author: Jan H.P. Eloff
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Digital Data Integrity: The Evolution from Passive Protection to Active Management, Author: David B Little
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham

Pagination Links