Who goes there? : authentication through the lens of privacy /
Handbook on data protection in humanitarian action /
Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles.
Civil liberties : overview, issues and trends /
Privacy concerns surrounding personal information sharing on health and fitness mobile apps /
Bulk collection : systematic government access to private-sector data /
Internet of things : emergence, perspectives, privacy and security issues /
Advances in cyber security : technology, operations, and experiences /
Safeguarding children and young people online : a guide for social workers /
EU GDPR : a pocket guide /
Technology and privacy : the new landscape /
The private is political : networked privacy and social media /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /
Nontechnical strategies to reduce children's exposure to inappropriate material on the internet : summary of a workshop /
Information security law : the emerging standard for corporate compliance /
CyberWar, CyberTerror, CyberCrime.
Innovativer Datenschutz.
Google hacking for penetration testers.
Security testing handbook for banking applications /
The insider threat : combatting the enemy within /
Internet privacy rights : rights to protect autonomy /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Techniques and applications of digital watermarking and content protection /
Consent in European Data Protection Law /
PCI compliance : implementing effective PCI data security standards /
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
The California Privacy Rights Act (CPRA) - an implementation and compliance guide.
Security law and methods /
Digital watermarking and steganography /
The Dutch implementation of the data retention directive : on the storage and use of telephone and internet traffic data for crime investigation purposes /
El derecho a la información y datos personales en México : una vision comparada con el sistema interamericano y europeo de derechos humanos.
Law on the electronic frontier /
EU General Data Protection Regulation (GDPR), Third Edition : an Implementation and Compliance Guide.
A public role for the private sector : industry self-regulation in a global economy /
Information Security Breaches : Avoidance and Treatment based on ISO27001.
Application Security in the ISO27001 Environment.
PCI DSS : a Pocket Guide.
Cybersecurity governance in Latin America states, threats, and alliances /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Securing the cloud : cloud computer security techniques and tactics /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Hack proofing XML /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Nokia network security : solutions handbook /
Cyber crime, security and digital intelligence /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /