Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Building A Global Information Assurance Program, Author: Raymond J Curts
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Effective Oracle Database 10g Security by Design, Author: David Knox
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, Author: Nii O. Attoh-Okine
Title: Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy, Author: Philip Alexander
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: Digital Preservation, Author: Marilyn Deegan
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Information Security Management: Concepts and Practice, Author: Bel G. Raggad
Title: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Author: Edward Skoudis
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Investigator's Guide to Steganography, Author: Gregory Kipper

Pagination Links