Title: Privacy Preserving Data Mining / Edition 1, Author: Jaideep Vaidya
Title: Surveillance Studies: An Overview / Edition 1, Author: David Lyon
Title: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings / Edition 1, Author: Ira S. Moskowitz
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Visions of Privacy: Policy Choices for the Digital Age / Edition 1, Author: Colin J. Bennett
Title: Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings / Edition 1, Author: Colin Boyd
Title: Database Security X: Status and prospects / Edition 1, Author: Pierangela Samarati
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings / Edition 1, Author: Huaxiong Wang
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1, Author: Damien Sauveron
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings / Edition 1, Author: Lynn Batten
Title: Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / Edition 1, Author: Andreas Pfitzmann
Title: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers / Edition 1, Author: Ton Kalker
Title: Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers / Edition 1, Author: Jessica Fridrich
Title: Information Security Management Handbook, Volume 2 / Edition 6, Author: Harold F. Tipton
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition / Edition 2, Author: Thomas R. Peltier
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite / Edition 1, Author: Jeff Scheidel
Title: Innovative Solutions for Access Control Management, Author: Ahmad Kamran Malik
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind / Edition 1, Author: James Bone
Title: Cloud Storage Security: A Practical Guide, Author: Aaron Wheeler
Title: Information Security: Design, Implementation, Measurement, and Compliance / Edition 1, Author: Timothy P. Layton

Pagination Links