Title: Anonymity, Author: Alison Macrina
Explore Series
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Author: Edward Skoudis
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: The Executive MBA in Information Security, Author: Jr.
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, Author: James Bone
Explore Series
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: The Executive MBA in Information Security, Author: Jr.
Title: Privacy and Data Protection Law in Ireland, Author: Denis Kelleher
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Protecting Oracle Database 12c, Author: Paul Wright
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, Author: Marc Goodman

Pagination Links