Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Digital Rights Management: Technological, Economic, Legal and Political Aspects, Author: Eberhard Becker
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, Author: Willem Jonker
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Author: Vijay Atluri
Title: Advances In Computer System Security, Vol. 3, Author: Rein Turn
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, Author: Ed Dawson
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings, Author: Kwangjo Kim
Title: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings, Author: David Aucsmith
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky

Pagination Links