Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Data protection
- Authority link
- http://id.worldcat.org/fast/00887958
- Source
- fast
551 Items that share the Concept Data protection
Context
Context of Data protectionSubject of
No resources found
No enriched resources found
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 13th International ISC Conference on Information Security & Cryptology : 7-8 September 2016, Faculty of Computer Science & Engineering, Shahid Beheshti University, Tehran, Iran
- 2001 IEEE Symposium on Security and Privacy : S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California
- 2003 Symposium on Security and Privacy : proceedings : May 11-14, 2003, Berkeley, California, USA
- 2004 Symposium on Security and Privacy : proceedings : Berkeley, California, May 9-12, 2004
- 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
- 2006 International Conference on Intelligent Information Hiding and Multimedia Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
- 2006 SecureComm and workshops : 28 August-1 September 2006, Baltimore, MD
- 2007 Third International Conference on Security and Privacy in Communication Networks and the Workshops
- 2008 IEEE Lebanon Communications Workshop
- 2009 International Conference on E-Business and Information System Security : Wuhan, China, 23-24 May 2009
- 2010 2nd International Conference on E-Business and Information System Security : EBISS 2010, 22-23 May, 2010 Wuhan, China
- 2010 Sixth International Conference on Information Assurance and Security
- 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on on Social Computing : proceedings, PASSAT/SocialCom 2011 : 9-11 October 2011, Boston, Massachusetts, USA
- 2012 9th International ISC Conference on Information Security and Cryptology : 13-14 September 2012 : Faculty of Electrical & Computer Engineering : University of Tabriz, Tabriz, Iran
- 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)
- 2013 Fourth International Conference on Emerging Security Technologies : EST 2013 : proceedings : 9-11 September 2013, Cambridge, United Kingdom
- 2013 International Symposium on Biometrics and Security Technologies
- 2014 11th International ISC Conference on Information Security and Cryptology : 3-4 September 2014 : School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran
- 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2014 International Symposium on Biometrics and Security Technologies (ISBAST) : proceedings : 26th-27th August 2014, Kuala Lumpur, Malaysia
- 2014 World Congress on Internet Security (WorldCIS)
- 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2015 World Congress on Internet Security (WorldCIS)
- 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) : 5-7 Dec. 2016
- 2016 IEEE Symposium on Security and Privacy : SP 2016 : proceedings : 23-25 May 2016, San Jose, California, USA
- 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) : September 6-7, 2017, Shiraz University, Shiraz, Iran
- 2017 IEEE Symposium on Security and Privacy : SP 2017 : proceedings : 22-24 May 2017, San Jose, California, USA
- 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) : August 28-29, 2018, Shahid Rajaee Teacher Training University - Tehran, Iran
- 2018 IEEE Symposium on Security and Privacy : SP 2018 : proceedings : 21-23 May 2018, San Francisco, California, USA
- 2019 IEEE Symposium on Security and Privacy : SP 2019 : proceedings : San Francisco, California, USA, 19-23 May 2019
- 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 11) : 3rd-4th November 2011, London, UK
- 88 privacy breaches to beware of : practical data protection tips from real-life experiences
- 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017)
- 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017) : 13-15 Dec. 2017
- A practical guide to security assessments
- A survey of data leakage detection and prevention solutions
- ACM transactions on information and system security
- ACM transactions on privacy and security
- Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006
- Achieving systems safety : proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012
- Advanced API Security : OAuth 2. 0 and Beyond
- Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website
- Advances in cryptology, CRYPTO '98 : 18th Annual International Conference, Santa Barbara, California, USA, August 23-27, 1998 : proceedings
- Advances in cryptology-- ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, proceedings
- Advances in information and computer security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
- An introduction to information security and ISO27001 : a pocket guide
- Analyzing computer security : a threat/vulnerability/countermeasure approach
- Anonymization
- Anonymous communication networks : protecting privacy on the web
- Anti-hacker tool kit
- Application of big data for national security : a practitioner's guide to emerging technologies
- Applied information security : a hands-on approach
- Assessing and Managing Security Risk in IT Systems
- Assessing data security : preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005
- Auditing cloud computing : a security and privacy guide
- Automated Lighting, 3rd Edition
- Backing up Oracle : using Tivoli Storage Management
- Behavioral advertising : industry practices and consumers' expectations : joint hearing before the Subcommittee on Commerce, Trade, and Consumer Protection and the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, June 18, 2009
- Big data: seizing opportunities, preserving values
- Building a global information assurance program
- Building an information security awareness program
- Building secure firmware : armoring the foundation of the platform
- Business continuity planning for data centers and systems : a strategic implementation guide
- Business plans handbook : a compilation of actual business plans developed by small businesses throughout North America, Volume 9
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- Cloud computing : an overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012
- Cloud computing security : foundations and challenges
- Cloud storage security : a practical guide
- Cloud storage security : a practical guide
- Cognitive hack : the new battleground in cybersecurity... the human mind
- Collaborative financial infrastructure protection : tools, abstractions, and middleware
- Communications and multimedia security : 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 ; proceedings
- CompTIA security+ guide to network security fundamentals
- Computer Matching Act, OMB and selected agencies need to ensure consistent implementation : report to congressional requesters
- Computer Matching and Privacy Protection Act of 1988 : P.L. 100-503, 102 Stat. 2507, October 18, 1988
- Computer privacy annoyances : how to avoid the most ANNOYING invasions of your personal and online privacy
- Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings
- Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
- Critical information infrastructures security : 4th international workshop, CRITIS 2009, Bonn, Germany, September 30-October 2, 2009 : revised papers
- Critical infrastructure protection VII : 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, revised selected papers
- Critical infrastructure protection VIII : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised selected papers
- Critical infrastructures : background and early implementation of PDD-63
- Critical infrastructures : background, policy, and implementation
- Cross-border data sharing under the CLOUD Act
- Cyber Security and Privacy : Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
- Cyber security : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session
- Cyber terrorism-a view from the Gilmore Commission : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 17, 2001
- Cybersecurity : critical infrastructure authoritative reports and resources
- Cybersecurity : federal government authoritative reports and resources
- Cybersecurity : overview reports and links to government, news, and related resources
- Cybersecurity : recent data breaches illustrate need for strong controls across federal agencies
- Cybersecurity in Switzerland
- DSCI - Best Practices Meet 2013
- Data Protection and Information Lifecycle Management
- Data and applications security and privacy XXIV : 24th annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010 ; proceedings
- Data and applications security and privacy XXVI : 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
- Data and applications security and privacy XXVIII : 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014 : proceedings
- Data governance : frameworks and strategies
- Data governance : how to design, deploy and sustain an effective data governance program
- Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
- Data hiding techniques in Windows OS : a practical approach to investigation and defense
- Data privacy and GDPR handbook
- Data privacy management and autonomous spontaneus [sic] security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers
- Data protection and the cloud : are the risks too great?
- Data protection and the cloud : are the risks too great?
- Data security : vulnerabilities and opportunities for improvement : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, first session, November 1, 2017
- Data security and privacy training
- Data security and security data : 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29-July 1, 2010. Revised selected papers
- Data stewardship : an actionable guide to effective data management and data governance
- Data storage for social networks : a socially aware approach
- Data transfer restrictions impede epidemiological research : report
- Dependable and Historic Computing : Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday
- Deployment guide for Infosphere Guardium
- Deployment guides series, IBM Tivoli Compliance Insight Manager
- Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
- Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Daten
- Digital identity
- Digital privacy : PRIME--Privacy and Identity Management for Europe
- Digital rights management : ACM CCS-9 workshop DRM 2002, Washington, DC, USA, November 18, 2002 : revised papers
- Digital rights management : technological, economic, legal and political aspects
- Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers
- Digital watermarking
- Digital watermarking : 4th international workshop, IWDW 2005, Siena, Italy, September 15-17, 2005 : proceedings
- Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings
- Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings
- Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers
- Digital watermarking : third international workshop, IWDW 2004, Seoul, South Korea, October 30-November 1, 2004 : revised selected papers
- Distributed Networks
- Domestic and international data protection issues : hearings before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Second Congress, first session, April 10 and October 17, 1991
- Dropbox : Sicher speichern und effektiv arbeiten in der Cloud
- E-Discovery and the Federal Rules of Civil Procedure : a Pocket Guide
- ESP8266 Home Automation Projects
- Elementary Information Security
- Encryption : individual right to privacy vs. national security : hearing before the Subcommittee on International Economic Policy and Trade of the Committee on International Relations, House of Representatives, One Hundred Fifth Congress, first session, May 8, 1997
- Encryption for organizations and individuals : basics of contemporary and quantum cryptography
- Encyclopedia of cryptography and security
- Enhancing data security : the regulators' perspective : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 18, 2005
- Enterprise architecture and information assurance : developing a secure foundation
- Error control, cryptology, and speech compression : Workshop on Information Protection, Moscow, Russia, December 6-9, 1993 : selected papers
- Examining the current data security and breach notification regulatory regime : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, second session, February 14, 2018
- Examining the evolving cyber insurance marketplace : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, March 19, 2015
- Examining the financial services industry's responsibilities and role in preventing identity theft and protecting sensitive financial information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on examining the financial services industry's responsibilities and role in preventing identity theft and protecting sensitive financial information, September 22, 2005
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Expert Oracle and Java security : programming secure Oracle database applications with Java
- FISMA certification & accreditation handbook
- Facebook nation : total information awareness
- Facebook nation : total information awareness
- Facing cyber threats head on : protecting yourself and your business
- Failure of VA's information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006
- Federal cybersecurity after the OPM data breach : have agencies learned their lesson? : hearing before the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fourteenth Congress, second session, November 16, 2016
- Federal information security : actions needed to address challenges
- Fifth International Symposium on Information Assurance and Security : proceedings, Xi'an, China, 18-20 August 2009
- Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
- Financial cryptography and data security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised selected papers
- Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers
- Financial cryptography and data security : FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canaray Islands, Spain, January 25-28, 2010 : revised selected papers
- Financial cryptography and data security : FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011 : revised selected papers
- Financial privacy and consumer protection : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Seventh Congress, second session on the growing concerns over the way consumers' personal and financial information is being shared or sold by their financial institutions, September 19, 2002
- Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
- Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
- Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers
- Formal to practical security : papers issued from the 2005-2008 French-Japanese collaboration
- Foundations for Evidence-based Policymaking Act of 2017 : report (to accompany H.R. 4174)
- Foundations of security analysis and design VI : FOSAD tutorial lectures
- Fourth Amendment and the Internet : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, April 6, 2000
- Frontiers in internet technologies : Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, revised selected papers
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Future of trust in computing : proceedings of the first international conference Future of Trust in Computing 2008
- GDPR for Dummies
- Getting started with OAuth 2.0
- Global security, safety, and sustainability & e-Democracy : 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised selected papers
- Global security, safety, and sustainability : 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings
- Global security, safety, and sustainability : 6th international conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings
- Hadoop security
- Hearing on the repeated failures of VA's information technology management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 14, 2006
- How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardship
- How to build privacy and security into deep learning models
- How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular company
- How to secure and audit Oracle 10g and 11g
- How to survive a data breach : a pocket guide
- IAS 2007 : Third International Symposium on Information Assurance and Security, proceedings, 29-31 August 2007, Manchester, United Kingdom
- IBM ProtecTIER Implementation and Best Practices Guide
- IBM ProtecTIER implementation and best practices guide
- IBM ProtecTIER implementation and best practices guide
- IBM QRadar Version 7.3 : planning and installation guide
- IBM QRadar Version 7.3 Planning and Installation Guide
- IBM system storage TS7650, TS7650G, and TS7610
- IBM system storage solutions for smarter systems
- ICITST : 2014 9th International Conference for Internet Technology and Secured Transactions
- IEEE International Siberian Conference on Control and Communications : SIBCON-2005 : proceedings : Russia, Tomsk, October 21-22, 2005
- IEEE International Siberian Conference on Control and Communications : SIBCON-2007 : proceedings : Russia, Tomsk, April 20-21, 2007
- IEEE-International Symposium on Biometrics & Security Technologies : ISBAST '08, 23-24 April, 2008, Islamabad
- IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China
- IIH-MSP 2009 : 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 12-14 September 2009, Kyoto, Japan
- IIH-MSP 2010 : 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings, Darmstadt, Germany, 15-17 October 2010
- IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan
- ISEA Asia Security & Privacy Conference 2017 : NIT Surat, India 395007, 29 Jan-1 Feb, 2017
- ISO 37001 : an Introduction to Anti-Bribery Management Systems
- ISO27001 / ISO27002 : a pocket guide / Alan Calder
- ISO27001/ISO27002 : 2013
- ISO27001/ISO27002 : a pocket guide
- IT-Sicherheit im Unternehmen
- IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflage
- Identity theft : recent developments involving the security of sensitive consumer information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on recent developments involving the security of sensitive consumer information relating to identity theft, focusing on laws currently applicable to resellers of consumer information, March 10 and 15, 2005
- Imaging for Crime Prevention and Detection (ICDP-15), 6th International Conference on : date 15-17 July 2015
- Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2
- Implementing high availability and disaster recovery in IBM PureApplication Systems V2
- Information Assurance and Security (IAS), 2013 9th International Conference on : date, 4-6 Dec. 2013
- Information Assurance and Security (IAS), 2014 10th International Conference on : date, 28-30 Nov. 2014
- Information Security Handbook
- Information Security Management Handbook, Volume 6, 6th Edition
- Information Security Policy Development for Compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
- Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings
- Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
- Information and communications security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
- Information assurance : security in the information environment
- Information assurance handbook : effective computer security and risk management strategies
- Information hiding : 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers
- Information hiding : 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, revised selected papers
- Information hiding : 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised selected papers
- Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings
- Information hiding : 5th international workshop, IH 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002 : revised papers
- Information hiding : 6th international workshop, IH 2004, Toronto, Canada, May 23-25 2004, revised selected papers
- Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers
- Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
- Information hiding : 9th international workshop, IH 2007, Saint Malo, France, June 11-13, 2007 : revised selected papers
- Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings
- Information privacy engineering and privacy by design : understanding privacy threats, technology, and regulations based on standards and best practices
- Information security : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
- Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings
- Information security : challenges to improving DOD's incident response capabilities
- Information security : principles and practices
- Information security and assurance : International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
- Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings
- Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
- Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings
- Information security and privacy : 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings
- Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Information security and privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
- Information security and privacy : 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings
- Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings
- Information security and privacy : 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings
- Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings
- Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
- Information security and privacy : Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 : proceedings
- Information security and privacy : third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings
- Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings
- Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers
- Information security applications : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised selected papers
- Information security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers
- Information security applications : 8th international workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007 : revised selected papers
- Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers
- Information security fundamentals
- Information security governance
- Information security management handbook, Volume 5
- Information security management metrics : a definitive guide to effective security monitoring and measurement
- Information security management principles
- Information security policies, procedures, and standards : a practitioner's reference
- Information security practice and experience : 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings
- Information security practice and experience : 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings
- Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
- Information security practice and experience : second international conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006 : proceedings
- Information security practice and experience : third international conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007 : proceedings
- Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
- Information security theory and practice : security and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings
- Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
- Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings
- Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings
- Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
- Information security theory and practices : smart devices, convergence and next generation networks : second IFIP WG 11.2 international workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings
- Information security, DHS needs to enhance capabilities, improve planning, and support greater adoption of its National Cybersecurity Protection System : report to congressional committees
- Information security, OPM has improved controls, but further efforts are needed : report to congressional committees
- Information security, federal agencies need to enhance responses to data breaches : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information storage and management : storing, managing, and protecting digital information
- Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environments
- Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings
- Information systems security : 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings
- Information theft prevention : theory and practice
- Information theft prevention : theory and practice
- Information theoretic security : 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers
- Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers
- Information, Security and Cryptology--ICISC 2009 : 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
- Infosecurity 2008 threat analysis
- Infrastructure security : international conference, InfraSec 2002, Bristol, UK, October 1-3, 2002 : proceedings
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
- Integrated Security Systems Design, 2nd Edition
- Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE RACE (1040)
- International Siberian Conference on Control and Communications : SIBCON-2009 : proceedings : Russia, Tomsk, March 27-28, 2009
- International journal for the data protection officer, privacy officer, privacy counsel
- International journal of information security and privacy
- International journal of information security and privacy
- Internet and surveillance : the challenges of Web 2.0 and social media
- Introduction to Hadoop security : a hands-on approach to securing big data clusters
- Introduction to computer and network security : navigating shades of gray
- Introduction to cyber-warfare : a multidisciplinary approach
- Introduction to information security : LiveLessons (Sneak Peek Video Training)
- Investigating the Cyber Breach : the digital forensics guide for the network engineer
- Investigating the Cyber Breach: : The Digital Forensics Guide for the Network Engineer
- IoT Penetration Testing Cookbook
- JPMorgan data breach involves information on 76 million households, 7 million small businesses
- Journal of information privacy & security
- Journal of information privacy & security
- Journal of information security and applications
- Kali Linux Wireless Penetration Testing Cookbook
- Karma-based API on Apple platforms : building privacy into iOS and macOS apps
- Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimization
- Legislative proposals to reform the current data security and breach notification regulatory regime : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, second session, March 7, 2018
- Lessons Learned : How to protect critical information infrastructure
- Lightweight Cryptography for Security and Privacy : Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013 : revised selected papers
- Malicious cryptography : exposing cryptovirology
- Malicious cryptography : exposing cryptovirology
- Managing Information Security Breaches : Studies from Real Life
- Managing SQL Server encryption certificates : getting started with SQL Server encryption
- Managing catastrophic loss of sensitive data
- Managing catastrophic loss of sensitive data : a guide for IT and security professionals
- Mapping security : the corporate security sourcebook for today's global economy
- Markets for cybercrime tools and stolen data : hackers' bazaar
- Mastering Active Directory - Second Edition
- Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016
- Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
- Mastering Python Forensics
- Mastering Python forensics : master the art of digital forensics and analysis with Python
- Mastering System Center Data Protection Manager 2007
- Measuring and managing information risk : a FAIR approach
- Metasploit Penetration Testing Cookbook : Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition
- Metasploit Revealed: : Secrets of the Expert Pentester
- Microsoft Enterprise Mobility and Security training
- Mobile authentication : problems and solutions
- Mobile device security for dummies
- Modern cryptography primer : theoretical foundations and practical applications
- Modern defense in depth : an integrated approach to better web application security
- Multi-domain master data management : advanced MDM and data governance in practice
- NetApp, Inc
- Netcat power tools
- Network security auditing
- Nine Steps to Success : An ISO 27001:2013 Implementation Overview, North American Edition
- Nine steps to success : an ISO 27001 implementation overview
- Nine steps to success : an ISO27001:2013 implementation overview
- OAuth 2 in action
- OPM data breach : personnel security background investigation data
- Once more into the data breach : the security of personal information at federal agencies : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, June 8, 2006
- Once more unto the breach : managing information security in an uncertain world
- Online advertising and hidden hazards to consumer security and data privacy : hearing before the Permanent Subcommittee on Investigations of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, May 15, 2014
- Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examples
- Oracle data guard 11g handbook
- Oversight hearing on Veterans Benefits Administration data security : joint hearing before the Committee on Veterans' Affairs, House of Representatives, Subcommittee on Economic Opportunity and the Subcommittee on Disability Assistance and Memorial Affairs, One Hundred Ninth Congress, second session, June 20, 2006
- Oversight of the Equifax data breach : answers for consumers : hearing before the Subcommittee on Digital Commerce and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, October 3, 2017
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- PCI DSS 3.1 : the standard that killed SSL
- PCI DSS : a pocket guide
- Passive and active measurement : 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings
- Penetration Testing Fundamentals: : A Hands-On Guide to Reliable Security Audits
- Penetration testing fundamentals
- Practical Hadoop security
- Practical risk management for the CIO
- Pragmatic security metrics : applying metametrics to information security
- Preserving privacy in data outsourcing
- Preventing good people from doing bad things : implementing least privilege
- Privacy and Big Data
- Privacy and anonymity in information management systems : new techniques for new practical problems
- Privacy and identity management for life : 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers
- Privacy and identity management for life : 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised selected papers
- Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers
- Privacy and security for cloud computing
- Privacy enhancing technologies : 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings
- Privacy enhancing technologies : 14th International Symposium, PETS 2014, Amsterdam, the Netherlands, July 16-18, 2014. Proceedings
- Privacy implications of online advertising : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, July 9, 2008
- Privacy in electronic communications : hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary, House of Representatives, One Hundred Fifth Congress, second session, March 26, 1998
- Privacy in statistical databases : CENEX-SDC project international conference, PSD 2006, Rome, Italy, December 13-15, 2006 : proceedings
- Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings
- Privacy in statistical databases : UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings
- Privacy in statistical databases : UNESCO chair in data privacy, international conference, PSD 2010, Corfu, Greece, September 22-24, 2010 : proceedings
- Privacy of social security records : hearing before the Subcommittee on Social Security and Family Policy of the Committee on Finance, United States Senate, One Hundred Second Congress, second session, February 28, 1992
- Privacy preserving data mining
- Privacy protections for personal information online
- Privacy technologies and policy : first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised selected papers
- Privacy technologies and policy : second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, proceedings
- Privacy vs. security
- Privacy, security, and trust in KDD : first ACM SIGKDD international workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007 : revised selected papers
- Privacy, security, and trust in KDD : second ACM SIGKDD international workshop, PinKDD 2008, Las Vegas, NV, USA, August 24-27, 2008 : revised selected papers
- Privacy-preserving data mining : models and algorithms
- Privileged attack vectors : building effective cyber-defense strategies to protect organizations
- Privileged attack vectors : building effective cyber-defense strategies to protect organizations
- Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins
- Proceedings 2000 IEEE Symposium on Security and Privacy : S & P 2000 : 14-17 May 2000, Berkeley, California, USA
- Proceedings 2010 IEEE International Conference on Information Theory and Information Security : December 17-19, 2010, Beijing, China
- Proceedings 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications : LightSec 2011 : 14-15 March 2011, Istanbul, Turkey
- Proceedings : 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20-22, 1991, Oakland, California
- Proceedings : 1992 IEEE Computer Society Symposium on Research in Security and Privacy, May 4-6, 1992, Oakland, California
- Proceedings : 1993 IEEE Computer Society Symposium on Research in Security and Privacy, May 24-26, 1993, Oakland, California
- Proceedings : 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security : IUCC-CSS 2016 : 14-16 December 2016, Granada, Spain
- Proceedings : DARPA Information Survivability Conference & Exposition II : DISCEX'01 : 12-14 June 2001, Anaheim, California
- Proceedings : DARPA Information Survivability Conference and Exposition : Washington, DC, April 22-24, 2003
- Proceedings of The Ifip Tc 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC08, September 7-10, 2008, Milano, Italy
- Proceedings of the 1983 Symposium on Security and Privacy, April 25-27, 1983, Oakland, California
- Proceedings of the 1986 IEEE Symposium on Security and Privacy, April 7-9, 1986, Oakland, California
- Proceedings of the 2009 International Conference on Computer and Communications Security : (ICCCS 2009) : 5-6 December 2009 : Hong Kong
- Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS) : 5-8 December 2011, Malacca, Malaysia
- Proceedings of the 2015 11th International Conference on Information Assurance and Security (IAS) : Marrakesh, Morocco, December 14-16, 2015
- Proceedings of the second International Conference on Information Security and Assurance : April 24-26, 2008, Busan, Korea
- Proceedings, 1987 IEEE Symposium on Security and Privacy, April 27-29, 1987, Oakland, California
- Proceedings, 1988 IEEE Symposium on Security and Privacy : April 18-21, 1988, Oakland, California
- Proceedings, 1989 IEEE Computer Society Symposium on Security and Privacy, May 1-3, 1989, Oakland, California
- Proceedings, 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7-9, 1990, Oakland, California
- Proceedings, 1995 IEEE Symposium on Security and Privacy : May 8-10, 1995, Oakland, California
- Proceedings, 1996 IEEE Symposium on Security and Privacy : May 6-8, 1996, Oakland, California
- Proceedings, 2011 International Conference on Network Computing and Information Security : NCIS 2011, 14-15 May 2011, Guilin, Guangxi, China
- Proceedings, 2012 IEEE Symposium on Security and Privacy, S & P 2012 : 21-23 May 2012, San Francisco, California, USA
- Proceedings, 2013 IEEE Symposium on Security and Privacy, SP 2013 : 19-22 May 2013, San Francisco, California, USA
- Proceedings, 2014 IEEE Symposium on Security and Privacy : SP 2014 : 18-21 May 2014, San Jose, California, USA
- Proceedings, 2015 IEEE Symposium on Security and Privacy : SP 2015 : 18-20 May 2015, San Jose, California, USA
- Proceedings, IEEE CS Security and Privacy Workshops, SPW 2012 : 24-25 May 2012, San Francisco, California, USA
- Proceedings, the Fourth International Symposium on Information Assurance and Security : proceedings : September 8-10, 2008, Napoli, Italy
- Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings
- Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
- Promoting and incentivizing cybersecurity best practices : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015
- Protecting Data Privacy Beyond the Trusted System of Record
- Protecting consumer information : can data breaches be prevented? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, second session, February 5, 2014
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Protecting small businesses against emerging and complex cyber-attacks : hearing before the Subcommittee on Health and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 21, 2013
- Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings
- Provable security : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings
- Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
- Responsive security : be ready to be secure
- Risk centric threat modeling : process for attack simulation and threat analysis
- Risk centric threat modeling : process for attack simulation and threat analysis
- SC magazine
- SC magazine
- Safeguarding consumers' financial data : hearing before the Subcommittee on National Security and International Trade and Finance of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Thirteenth Congress, second session, on examining the procedures for overseeing data security and breaches of data security by the United States Secret Service and the Federal Trade Commission, February 3, 2014
- Secure ICT service provisioning for cloud, mobile and beyond : a workable architectural approach balancing between buyers and providers
- Secure data management : 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings
- Secure data management : 8th VLDB workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings
- Secure data management : 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings
- Securing consumers' data : options following security breaches : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, May 11, 2005
- Securing digital video : techniques for DRM and content protection
- Securing web applications : building a strategy for defense against malicious bots
- Security Automation with Ansible 2
- Security and Privacy, 1980 IEEE Symposium on
- Security and Privacy, 1981 IEEE Symposium on
- Security and Privacy, 1984 IEEE Symposium on
- Security and Privacy, 1997 : Proceedings, IEEE Symposium on Security and Privacy (1997: Oakland, CA)
- Security and Privacy, 1998 IEEE Symposium On
- Security and Privacy,1994 Symposium On Research In
- Security and privacy : proceedings of the 1999 IEEE Symposium on Security and Privacy : May 9-12, 1999, Oakland, California
- Security and privacy in biometrics
- Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers
- Security and privacy in cyber-physical systems : foundations, principles, and applications
- Security and privacy in cyber-physical systems : foundations, principles, and applications
- Security and privacy in digital rights management : ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers
- Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers
- Security and privacy in social networks
- Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
- Security and the networked society
- Security assessment in vehicular networks
- Security de-engineering : solving the problems in information risk management
- Security in computing
- Security in computing
- Security in the digital world : for the home user, parent, consumer and home office
- Security informatics
- Security informatics
- Security policies and implementation issues
- Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
- Security strategy : from requirements to reality
- Security technology, disaster recovery and business continuity : international conferences, SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings
- Security, privacy, and governance : protecting data, and using data to protect systems
- Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers
- Sensor systems and software : 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, revised selected papers
- Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud
- Sharing big data safely : managing data security
- Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments
- Small business, big threat : protecting small businesses from cyber attacks : hearing before the Committee on Small Business, United States House of Representatives, One Hundred Fourteenth Congress, first session, hearing held April 22, 2015
- SmartData : privacy meets evolutionary robotics
- SocialCom 2010 : proceedings, the second IEEE International Conference on Social Computing : PASSAT 2010, the second IEEE International Conference on Privacy, Security, Risk, and Trust : Minneapolis, Minnesota, USA, August 20-22, 2010
- Software similarity and classification
- Solving Cyber Risk : Protecting Your Company and Society
- Solving the Enigma : History of Cryptanalytic Bombe
- Spring Security - Third Edition
- Statistical confidentiality : principles and practice
- Strata conference 2011 : complete video compilation
- Strategic Information Management, 3rd Edition
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach
- TEchnical and LEgal aspects of data pRivacy and SEcurity, 2015 IEEE/ACM 1st International Workshop on
- Take Control of 1Password, 4th Edition
- Take Control of Your Online Privacy, 4th Edition
- The Antideficiency Act Answer Book
- The Appropriations Law Answer Book
- The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
- The COR/COTR Answer Book, 3rd Edition
- The Complete 2020 Ethereum and Solidity Developer Bootcamp
- The Definitive Guide to the C & A Transformation Process
- The PayPal official insider guide to internet security : spot scams and protect your online business
- The Prompt Payment Act Answer Book
- The Science and Technology of Counterterrorism
- The Target data breach : frequently asked questions
- The Yahoo! data breach--issues for Congress
- The business case for network security : advocacy, governance, and ROI
- The chief information security officer : insights, tools and survival skills
- The cloud security ecosystem : technical, legal, business and management issues
- The cloud security ecosystem : technical, legal, business and management issues
- The connected world : examining the Internet of Things : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 11, 2015
- The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
- The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
- The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
- The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
- The economics of financial and medical identity theft
- The encryption debate : criminals, terrorists, and the security needs of business and industry : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session ... September 3, 1997
- The future of identity in the information society : 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008 : revised Selected Papers
- The information systems security officer's guide : establishing and managing a cyber security program
- The information systems security officer's guide : establishing and managing a cyber security program
- The insider threat : combatting the enemy within
- The privacy engineer's manifesto : getting from policy to code to QA to value
- The security risk assessment handbook : a complete guide for performing security risk assessments
- The shellcoder's handbook : discovering and exploiting security holes
- The shellcoder's handbook : discovering and exploiting security holes
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The threat of foreign economic espionage to U.S. corporations : hearings before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, second session, April 29 and May 7, 1992
- The threat to Americans' personal information : a look into the security and reliability of the health exchange data hub : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, September 11, 2013
- The world beyond digital rights management
- They know everything about you : how data-collecting corporations and snooping government agencies are destroying democracy
- Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings
- Total information risk management : maximizing the value of data and information assets
- Total information risk management : maximizing the value of data and information assets
- Towards sustainable society on ubiquitous networks : the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24-16, 2008, Tokyo, Japan
- Trade secrets : promoting and protecting American innovation, competitiveness and market access in foreign markets : hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, second session, June 24, 2014
- Transactions on data hiding and multimedia security V
- Transactions on data hiding and multimedia security VI