Data protection.
Overview
Works: | 213 works in 108 publications in 108 languages |
---|
Titles
The executive guide to information security : = threats, challenges, and solutions /
by:
(Language materials, printed)
Oracle 11i implement and use cost management average and standard costing student guide /
by:
(Language materials, printed)
Oracle 11i order to cash fundamentals supplemental practices additional materials /
by:
(Language materials, printed)
Information hiding : = steganography and watermarking : attacks and countermeasures /
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection /
by:
(Language materials, printed)
Oracle 11i implement and use material requirements planning student guide /
by:
(Language materials, printed)
Oracle 11i asset management fundamentals supplement student practices /
by:
(Language materials, printed)
Oracle R11i implement and use Oracle engineering and bill of material /
by:
(Language materials, printed)
Digital defense : = what you should know about protecting your company's assets /
by:
(Language materials, printed)
Finding and fixing vulnerabilities in information systems = the vulnerability assessment & mitigation methodology /
by:
(Language materials, printed)
Protecting your library's digital sources = the essential guide to planning and preservation /
by:
(Language materials, printed)
Safe and secure = secure your home network, and protect your privacy online /
by:
(Language materials, printed)
Information disparity = research and measurement challenges in an interconnected world /
by:
(Language materials, printed)
IT governance = a manager's guide to data security and BS 7799/ISO 17799 /
by:
(Language materials, printed)
Contingency planning and disaster recovery : = protecting your organization's resources /
by:
(Language materials, printed)
Privacy and anonymity in information management systems = new techniques for new practical problems /
by:
(Language materials, printed)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(Electronic resources)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Electronic resources)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(Language materials, printed)
Information theoretic security = 7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Electronic resources)
Cyber security and privacy = third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers /
by:
(Electronic resources)
Information systems security = 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(Electronic resources)
Enhancing information security and privacy by combining biometrics with cryptography
by:
(Electronic resources)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Electronic resources)
Physical and data-link security techniques for future communication systems
by:
(Electronic resources)
Data protection on the move = current developments in ICT and privacy/data protection /
by:
(Electronic resources)
Risk centric threat modeling = process for attack simulation and threat analysis /
by:
(Electronic resources)
Data thieves in action = examining the international market for stolen personal information /
by:
(Electronic resources)
Secure ICT service provisioning for cloud, mobile and beyond = ESARIS: the answer to the demands of industrialized IT production balancing between buyers and providers /
by:
(Electronic resources)
Data privacy = foundations, new developments and the big data challenge /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations
by:
(Electronic resources)
Security and privacy in cyber-physical systems = foundations, principles, and applications /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Electronic resources)
Machine learning and intelligent communications = 5th International Conference, MLICOM 2020, Shenzhen, China, September 26-27, 2020 : proceedings /
by:
(Electronic resources)
Serverless security = understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /
by:
(Electronic resources)
Improving information security practices through computational intelligence
by:
(Electronic resources)
New methods and tools for intelligent data processing and information security systems
by:
(Electronic resources)
Privacy concerns surrounding personal information sharing on health and fitness mobile apps
by:
(Electronic resources)
Data governance and data management = contextualizing data governance drivers, technologies, and tools /
by:
(Electronic resources)
The classical liberal case for privacy in a world of surveillance and technological change /
by:
(Language materials, printed)
Security protocols XXVII = 27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
by:
(Electronic resources)
Big data, algorithms and food safety = a legal and ethical approach to data ownership and data governance /
by:
(Electronic resources)
Data stewardship = an actionable guide to effective data management and data governance /
by:
(Electronic resources)
Data privacy and crowdsourcing = a comparison of selected problems in China, Germany and the United States /
by:
(Electronic resources)
Fraud prevention, confidentiality, and data security for modern businesses
by:
(Electronic resources)
Information hiding techniques for steganography and digital watermarking
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection
by:
(Language materials, printed)
Key capabilities of an electronic health record system = letter report /
by:
(Language materials, printed)
Surveillance as social sorting = privacy, risk, and digital discrimination /
by:
(Language materials, printed)
Information security = a manager's guide to thwarting data thieves and hackers /
by:
(Language materials, printed)
Protecting your health privacy = a citizen's guide to safeguarding the security of your medical information /
by:
(Electronic resources)
Collaborative financial infrastructure protection = tools, abstractions, and middleware /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Language materials, printed)
Information security, coding theory and related combinatorics = information coding and combinatorics /
by:
(Language materials, printed)
Information security governance = a practical development and implementation approach /
by:
(Electronic resources)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Electronic resources)
Data governance = how to design, deploy, and sustain an effective data governance program /
by:
(Electronic resources)
Passive and active measurement = 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(Electronic resources)
The privacy engineer's manifesto = getting from policy to code to QA to value /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(Electronic resources)
Total information risk management = maximizing the value of data and information assets /
by:
(Electronic resources)
Advances in information and computer security = 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Electronic resources)
Security de-engineering = solving the problems in information risk management /
by:
(Electronic resources)
Security protocols XXII = 22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(Electronic resources)
10 don'ts on our digital devices = the non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
Attribute-based credentials for trust = identity in the information society /
by:
(Electronic resources)
Self- and co-regulation in cybercrime, cybersecurity and national security
by:
(Electronic resources)
Privacy in a digital, networked world = technologies, implications and solutions /
by:
(Electronic resources)
Cyber denial, deception and counter deception = a framework for supporting active cyber defense /
by:
(Electronic resources)
Application of big data for national security = a practitioner's guide to emerging technologies /
by:
(Electronic resources)
Virtuality and capabilities in a world of ambient intelligence = new challenges to privacy and data protection /
by:
(Electronic resources)
Elements of cloud storage security = concepts, designs and optimized practices /
by:
(Electronic resources)
Multimedia forensics and security = foundations, innovations, and applications /
by:
(Electronic resources)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
Emerging technologies for authorization and authentication = second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019 : proceedings /
by:
(Electronic resources)
The cloud security ecosystem = technical, legal, business and management issues /
by:
(Electronic resources)
Implementing computational intelligence techniques for security systems design
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Pro Google cloud automation = with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins /
by:
(Electronic resources)
Digital transformation, cyber security and resilience of modern societies
by:
(Electronic resources)
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
by:
(Electronic resources)
Protecting patient information = a decision-maker's guide to risk, prevention, and damage control /
by:
(Electronic resources)
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
by:
(Electronic resources)
Linking sensitive data = methods and techniques for practical privacy-preserving information sharing /
by:
(Electronic resources)
Advanced ASP.NET Core 3 Security = understanding hacks, attacks, and vulnerabilities to secure your website /
by:
(Electronic resources)
Cyberspace mimic defense = generalized robust control and endogenous security /
by:
(Electronic resources)
Data governance for managers = the driver of value stream optimization and a pacemaker for digital transformation /
by:
(Electronic resources)
What people leave behind = marks, traces, footprints and their relevance to knowledge society /
by:
(Electronic resources)
Future data and security engineering : big data, security and privacy, smart city and industry 4.0 applications = 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022 : proceedings /
by:
(Electronic resources)
Auditing corporate surveillance systems = research methods for greater transparency /
by:
(Electronic resources)
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
by:
(Electronic resources)
Security and privacy in the Internet of things = architectures, techniques, and applications /
by:
(Electronic resources)
Applications of machine learning and deep learning for privacy and cybersecurity
by:
(Electronic resources)
Show more
Fewer
Subjects