Search ResultsElectronic Resources 
by
Cox, I. J. (Ingemar J.)
ScienceDirect http://www.sciencedirect.com/science/book/9780123725851
Format:
Excerpt:
techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to
by
Speed, Tim.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582982
Format:
Excerpt:
latest information on how to guard against attacks and informs the IT manager of the products that can
by
Winkler, J. R. (Joachim R.)
ScienceDirect http://www.sciencedirect.com/science/book/9781597495929
Format:
Excerpt:
-resilience. This book details the strengths and weaknesses of securing your company's information with different
by
Qian, Yi, 1962-
ScienceDirect https://www.sciencedirect.com/science/book/9780123735669
Format:
Excerpt:
information technology to do business. Unfortunately, with the advent of such technology came new and complex
by
Zeng, Wenjun, 1967-
ScienceDirect http://www.sciencedirect.com/science/book/9780123694768
Format:
Excerpt:
-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their
by
Rogers, Russ.
ScienceDirect https://www.sciencedirect.com/science/book/9781928994985
Format:
Excerpt:
technology covered in the book is both real and thought provoking. Readers can realize the threat posed by
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Excerpt:
a growing concern for organizations and their information technology managers. This book draws upon
by
Shinder, Debra Littlejohn, author.
ScienceDirect https://www.sciencedirect.com/science/book/9781931836654
Format:
Excerpt:
: law enforcement and information technology. This book will help both IT pros and law enforcement
by
Todd, Chad.
Format:
Excerpt:
your IT security organization."--Deena Joyce, Director of Information Technology and Network Security
by
Winkler, Ira.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491686
Format:
Excerpt:
of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible
by
Maynor, David.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490566
Format:
Excerpt:
. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents
by
Long, Johnny.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492157
Format:
Excerpt:
As the clicȟ reminds us, information is power. In this age of computer systems and technology, an

Select an Action





