Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings, Author: George Davida
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, Author: Sushil Jajodia
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Trust and Privacy in Digital Business: Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, Author: Simone Fischer-Hübner
Title: Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, Author: Ernesto Damiani
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, Author: Mauro Barni
Title: Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, Author: Fabien A. P. Petitcolas
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Facebook Nation: Total Information Awareness, Author: Newton Lee
Title: Principles of Data Security, Author: Ernst L. Leiss
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Author: Damien Sauveron

Pagination Links