Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Practical Data Security, Author: John Gordon
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Advances In Artificial Intelligence For Privacy Protection And Security, Author: Agusti Solanas
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Case Study of Security Problems and Their Solutions, Author: Gunner O. Klein
Title: Informed Watermarking, Author: Joachim Eggers
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold

Pagination Links