Title: Small Business Cyber Security: Your Customers Can Trust You...Right?, Author: Adam Anderson
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: The Economic Costs and Implications of High-Technology Hardware Theft, Author: James N. Dertouzos
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Student Data Privacy: Managing Vendor Relationships, Author: Linnette Attai
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll
Title: Information Privacy in the Evolving Healthcare Environment, Author: Linda Koontz
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, Author: Kaushal Solanki
Title: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Author: Rei Safavi-Naini
Title: Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers, Author: Tomas Sander
Title: Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, Author: Teddy Furon
Title: Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, Author: Ernesto Damiani

Pagination Links