Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Data Privacy: Principles and Practice, Author: Nataraj Venkataramanan
Title: Information Hiding Techniques For Steganography And Digital Watermarking, Author: Stefan Katzenbeisser
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: SAP HANA Security Guide, Author: Jonathan Haun
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby

Pagination Links