Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Computer And Intrusion Forensics, Author: George Mohay
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green

Pagination Links