Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Case Study of Security Problems and Their Solutions, Author: Gunnar O. Klein
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Security Of Data And Transaction Processing, Author: Vijay Atluri
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers, Author: Simone Fischer-Hübner
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Informed Watermarking, Author: Joachim Eggers
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile

Pagination Links