Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Surveillance Studies: A Reader, Author: Torin Monahan
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Security and Privacy in Advanced Networking Technologies, Author: Borka Jerman-Blazic
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite / Edition 1, Author: Jeff Scheidel
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition / Edition 2, Author: Thomas R. Peltier
Title: Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings / Edition 1, Author: Josef Pieprzyk
Title: Investigator's Guide to Steganography / Edition 1, Author: Gregory Kipper
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination / Edition 1, Author: David Lyon
Title: Surviving Security: How to Integrate People, Process, and Technology / Edition 2, Author: Amanda Andress
Title: Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain / Edition 1, Author: Csilla Farkas
Title: The CISO Handbook: A Practical Guide to Securing Your Company / Edition 1, Author: Michael Gentile
Title: Database and Applications Security: Integrating Information Security and Data Management / Edition 1, Author: Bhavani Thuraisingham
Title: Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers / Edition 1, Author: Kaushal Solanki

Pagination Links