Title: Database Security XII: Status and Prospects / Edition 1, Author: Sushil Jajodia
Title: Data and Applications Security XVII: Status and Prospects / Edition 1, Author: Sabrina De Capitani di Vimercati
Title: Secure Data Management in Decentralized Systems / Edition 1, Author: Ting Yu
Title: Database Security X: Status and prospects / Edition 1, Author: Pierangela Samarati
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: Database and Applications Security: Integrating Information Security and Data Management / Edition 1, Author: Bhavani Thuraisingham
Title: A Practical Guide to Security Engineering and Information Assurance / Edition 1, Author: Debra S. Herrmann
Title: Surviving Security: How to Integrate People, Process, and Technology / Edition 2, Author: Amanda Andress
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition / Edition 2, Author: Thomas R. Peltier
Title: Information Security: Design, Implementation, Measurement, and Compliance / Edition 1, Author: Timothy P. Layton
Title: Analyzing and Securing Social Networks / Edition 1, Author: Bhavani Thuraisingham
Title: Convolutional Coding / Edition 1, Author: L H Charles Lee
Title: Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering / Edition 1, Author: Nii O. Attoh-Okine
Title: Advances In Artificial Intelligence For Privacy Protection And Security, Author: Agusti Solanas
Title: Information Security Management: Concepts and Practice / Edition 1, Author: Bel G. Raggad
Title: Investigator's Guide to Steganography / Edition 1, Author: Gregory Kipper
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams / Edition 1, Author: Jake Kouns
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez

Pagination Links