Title: The Executive MBA in Information Security, Author: Jr.
Title: Protecting Oracle Database 12c, Author: Paul Wright
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Case Study of Security Problems and Their Solutions, Author: Gunner O. Klein
Title: Privacy Preserving Data Mining, Author: Jaideep Vaidya
Title: Principles of Data Security, Author: Ernst L. Leiss
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Author: Vijay Atluri
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings, Author: Colin Boyd
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, Author: Andrei Mikhailovsky

Pagination Links