Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer
Title: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings, Author: Liqun Chen
Title: Oracle Data Guard 11g Handbook, Author: Sonya Carothers
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers, Author: Giovanni Di Crescenzo
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings, Author: Vijay Varadharajan

Pagination Links