Browse Books in Security
Security Requirements Engineering
Designing Secure Socio-Technical Systems
Business Cyberbullies and How To Fight Back
When Technocultures Collide
Innovation from Below and the Struggle for Autonomy
Identity Theft and Fraud
Evaluating and Managing Risk
Identity Theft and Fraud
Evaluating and Managing Risk
Dynamic Mixed Models for Familial Longitudinal Data
Information Theoretic Security
Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings
Selected Areas in Cryptography
14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Privacy Enhancing Technologies
7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers
Selected Areas in Cryptography
13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers
Identify Theft Toolkit
How to recover from and avoid identity theft.
Selected Areas in Cryptography
10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers
Selected Areas in Cryptography
9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers
Regulating Privacy
Data Protection and Public Policy in Europe and the United States