Title: Vulnerability Management, Author: Park Foreman
Title: The Death of the Internet, Author: Markus Jakobsson
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Surveillance Studies: An Overview, Author: David Lyon
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: Small Business Cyber Security: Your Customers Can Trust You...Right?, Author: Adam Anderson
Title: Sharing Big Data Safely: Managing Data Security, Author: Ted Dunning
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Practical Data Security, Author: John Gordon
Title: Oracle8i Backup & Recovery, Author: Rama Velpuri
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Oracle Data Guard 11g Handbook, Author: Larry Carpenter
Title: Information Theft Prevention: Theory and Practice, Author: Romanus Okeke
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference, Author: Douglas J. Landoll

Pagination Links