Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Computer Security: 20 Things Every Employee Should Know, Author: Ben Rothke
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Protecting Oracle Database 12c, Author: Paul Wright
Title: The Death of the Internet, Author: Markus Jakobsson

Pagination Links