Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings, Author: Sokratis Katsikas
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, Author: Ira S. Moskowitz
Title: Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings, Author: George Davida
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter
Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, Author: Gilles Barthe
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Information Security Management Handbook, Volume 2, Author: Harold F. Tipton
Title: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings, Author: Liqun Chen
Title: Protecting Oracle Database 12c, Author: Paul Wright
Title: Recent Advances in Information Hiding and Applications, Author: Jeng-Shyang Pan
Title: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, Author: Ton Kalker
Title: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, Author: Kim Sehun
Title: Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation, Author: Antoon Bosselaers
Title: Vulnerability Management, Author: Park Foreman
Title: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, Author: Sokratis Katsikas
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel

Pagination Links