DATA SECURITY 16
Iovan, S., & Iovan, A. A. (2016). From Cyber Threats to Cyber-Crime. Journal of Information
Systems & Operations Management, 425.
Lee, R. B., Fiskiran, A. M., Shi, Z., & Yang, X. (2002). Refining instruction set architecture for
high-performance multimedia processing in constrained environments. In Application-
Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE
International Conference on (pp. 253-264). IEEE.
MacAskill, E., Sam., and Philip, O. (2017, March) "WikiLeaks publishes 'biggest ever leak of
secret CIA documents'" The Guardian. Guardian News and Media.
Url://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-
of-secret-cia-documents-hacking-surveillance. Accessed on 05 Mar. 2017.
Matwyshyn, A. (Ed.). (2009). Harboring data: information security, law, and the corporation.
Stanford University Press.
Monahan, T. (2010). The future of security? Surveillance operations at homeland security fusion
centers. Social Justice, 37(2/3 (120-121), 84-98.
Sales, N. A. (2010). Mending walls: Information sharing after the USA PATRIOT Act.
Shen, Y. (Ed.). (2013). Enabling the New Era of Cloud Computing: Data Security, Transfer, and
Management: Data Security, Transfer, and Management. IGI Global.
Spivey, B., & Echeverria, J. (2015). Hadoop Security: Protecting your big data platform. "
O'Reilly Media, Inc.".