Title: Computer Security: 20 Things Every Employee Should Know, Author: Ben Rothke
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Effective Oracle Database 10g Security by Design, Author: David Knox
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Vulnerability Management, Author: Park Foreman
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, Author: John Hoopes
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton

Pagination Links