Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb

Pagination Links