Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Facing Cyber Threats Head On: Protecting Yourself and Your Business
by Brian Minick
Narrated by  Patrick Lawlor
Audiobook (Unabridged) $14.99
. Price is $14.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier
Title: Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, Author: Willem Jonker
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Trust and Privacy in Digital Business: Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, Author: Simone Fischer-Hübner
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Effective Oracle Database 10g Security by Design, Author: David Knox
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993, Author: Bhavani Thuraisingham
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Managing Cyberecurity Resources: A Financial Perspective, Author: Martin P. Loeb
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain, Author: Csilla Farkas
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, Author: Fabien A. P. Petitcolas

Pagination Links