Data protection.
概要
作品: | 213 作品在 108 項出版品 108 種語言 |
---|
書目資訊
The executive guide to information security : = threats, challenges, and solutions /
by:
(書目-語言資料,印刷品)
Information hiding : = steganography and watermarking : attacks and countermeasures /
by:
(書目-語言資料,印刷品)
Oracle 11i order to cash fundamentals supplemental practices additional materials /
by:
(書目-語言資料,印刷品)
Contingency planning and disaster recovery : = protecting your organization's resources /
by:
(書目-語言資料,印刷品)
Privacy and anonymity in information management systems = new techniques for new practical problems /
by:
(書目-語言資料,印刷品)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(書目-電子資源)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(書目-電子資源)
Collaborative financial infrastructure protection = tools, abstractions, and middleware /
by:
(書目-電子資源)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(書目-語言資料,印刷品)
Information security, coding theory and related combinatorics = information coding and combinatorics /
by:
(書目-語言資料,印刷品)
Information security governance = a practical development and implementation approach /
by:
(書目-電子資源)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(書目-電子資源)
Cyber denial, deception and counter deception = a framework for supporting active cyber defense /
by:
(書目-電子資源)
Virtuality and capabilities in a world of ambient intelligence = new challenges to privacy and data protection /
by:
(書目-電子資源)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(書目-電子資源)
Security and privacy in cyber-physical systems = foundations, principles, and applications /
by:
(書目-電子資源)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Pro Google cloud automation = with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins /
by:
(書目-電子資源)
New methods and tools for intelligent data processing and information security systems
by:
(書目-電子資源)
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
by:
(書目-電子資源)
Advanced ASP.NET Core 3 Security = understanding hacks, attacks, and vulnerabilities to secure your website /
by:
(書目-電子資源)
Big data, algorithms and food safety = a legal and ethical approach to data ownership and data governance /
by:
(書目-電子資源)
What people leave behind = marks, traces, footprints and their relevance to knowledge society /
by:
(書目-電子資源)
Data stewardship = an actionable guide to effective data management and data governance /
by:
(書目-電子資源)
Security and privacy in the Internet of things = architectures, techniques, and applications /
by:
(書目-電子資源)
Oracle 11i implement and use cost management average and standard costing student guide /
by:
(書目-語言資料,印刷品)
Finding and fixing vulnerabilities in information systems = the vulnerability assessment & mitigation methodology /
by:
(書目-語言資料,印刷品)
Protecting your library's digital sources = the essential guide to planning and preservation /
by:
(書目-語言資料,印刷品)
Information disparity = research and measurement challenges in an interconnected world /
by:
(書目-語言資料,印刷品)
Protecting your health privacy = a citizen's guide to safeguarding the security of your medical information /
by:
(書目-電子資源)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(書目-語言資料,印刷品)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(書目-電子資源)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(書目-電子資源)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(書目-電子資源)
Data governance = how to design, deploy, and sustain an effective data governance program /
by:
(書目-電子資源)
Information theoretic security = 7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(書目-電子資源)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(書目-電子資源)
Total information risk management = maximizing the value of data and information assets /
by:
(書目-電子資源)
Security protocols XXII = 22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(書目-電子資源)
10 don'ts on our digital devices = the non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
Data protection on the move = current developments in ICT and privacy/data protection /
by:
(書目-電子資源)
Application of big data for national security = a practitioner's guide to emerging technologies /
by:
(書目-電子資源)
Data thieves in action = examining the international market for stolen personal information /
by:
(書目-電子資源)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(書目-電子資源)
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
by:
(書目-電子資源)
Protecting patient information = a decision-maker's guide to risk, prevention, and damage control /
by:
(書目-電子資源)
Privacy concerns surrounding personal information sharing on health and fitness mobile apps
by:
(書目-電子資源)
Data governance and data management = contextualizing data governance drivers, technologies, and tools /
by:
(書目-電子資源)
The classical liberal case for privacy in a world of surveillance and technological change /
by:
(書目-語言資料,印刷品)
Security protocols XXVII = 27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
by:
(書目-電子資源)
Linking sensitive data = methods and techniques for practical privacy-preserving information sharing /
by:
(書目-電子資源)
Data governance for managers = the driver of value stream optimization and a pacemaker for digital transformation /
by:
(書目-電子資源)
Data privacy and crowdsourcing = a comparison of selected problems in China, Germany and the United States /
by:
(書目-電子資源)
更多
較少的
主題