Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, Author: Willem Jonker
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, Author: Ed Dawson
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Investigator's Guide to Steganography, Author: Gregory Kipper

Pagination Links