Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Practical Data Security, Author: John Gordon
Title: Small Business Cyber Security: Your Customers Can Trust You...Right?, Author: Adam Anderson
Title: Digital Rights Management: Protecting and Monetizing Content, Author: Joan Van Tassel
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Vulnerability Management, Author: Park Foreman
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter

Pagination Links