Information Security And Computer Fraud

Coursera - Information Security and Risk Management in Context [repost]  eBooks & eLearning

Posted by ParRus at Nov. 20, 2016
Coursera - Information Security and Risk Management in Context [repost]

Coursera - Information Security and Risk Management in Context
University of Washington with Barbara Endicott-Popovsky

WEBRip | English | MP4 | 960 x 540 | AVC ~456 kbps | 29.970 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | Subs: English (.srt) | 16:43:29 | 2.54 GB
Genre: eLearning Video / Information Technology, Security

Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders.

Enterprise Information Security and Privacy  eBooks & eLearning

Posted by leonardo78 at Sept. 13, 2016
Enterprise Information Security and Privacy

Enterprise Information Security and Privacy by C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer
Publisher: Artech House | 2009 | ISBN: 1596931906 | 231 pages | PDF | 1,4 MB

Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities.
Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea

Soonhak Kwon and Aaram Yun, "Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea"
English | ISBN: 3319308394 | 2016 | 390 pages | PDF | 14 MB
Pervasive Information Security and Privacy Developments: Trends and Advancements

Pervasive Information Security and Privacy Developments: Trends and Advancements by Hamid Nemati
English | 2010 | ISBN: 1616920009 | 442 pages | PDF | 6 MB
Information Technology and Computer Application Engineering: Proceedings of the International Conference on... (repost)

Information Technology and Computer Application Engineering: Proceedings of the International Conference on Information Technology and Computer Application Engineering (ITCAE 2013) by Hsiang-Chuan Liu, Wen-Pei Sung, Yao Wenli
English | 2013 | ISBN: 1138000795 | 836 pages | PDF | 184 MB

Economics of Information Security and Privacy III  

Posted by ChrisRedfield at June 2, 2015
Economics of Information Security and Privacy III

Bruce Schneier - Economics of Information Security and Privacy III
Published: 2012-09-26 | ISBN: 1461419808, 1493900366 | PDF | 286 pages | 4.03 MB

Information Security and Cryptology - ICISC 2014  

Posted by arundhati at May 3, 2015
Information Security and Cryptology - ICISC 2014

Jooyoung Lee, Jongsung Kim, "Information Security and Cryptology - ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers"
2015 | ISBN-10: 3319159429 | 448 pages | PDF | 23 MB

Information Security and Cryptology  

Posted by arundhati at May 3, 2015
Information Security and Cryptology

Dongdai Lin, Moti Yung, "Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers"
2015 | ISBN-10: 3319167448 | 564 pages | PDF | 30 MB
Information Security and Ethics: Social and Organizational Issues by Marian Quigley [Repost]

Information Security and Ethics: Social and Organizational Issues by Marian Quigley
English | July 2004 | ISBN: 1591402336, 1591402867 | 335 Pages | PDF | 3 MB

Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study.
Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003 (Repost)

Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) by Jong In Lim
English | 2004 | ISBN: 3540213767 | 469 Pages | PDF | 13 MB

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.