Data protection.
Overview
Works: | 53 works in 52 publications in 52 languages |
---|
Titles
The future of identity in the information society = challenges and opportunities /
by:
(Electronic resources)
Information security, coding theory and related combinatorics = information coding and combinatorics /
by:
(Electronic resources)
The information systems security officer's guide : = establishing and managing an information protection program /
by:
(Language materials, printed)
Foundations of security analysis and design VI = FOSAD tutorial lectures /
by:
(Electronic resources)
Preventing good people from doing bad things = implementing least privilege /
by:
(Electronic resources)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Data governance = how to design, deploy, and sustain an effective data governance program /
by:
(Electronic resources)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(Electronic resources)
IT governance = a manager's guide to data security and BS 7799/ISO 17799 /
by:
(Electronic resources)
Collaborative financial infrastructure protection = tools, abstractions, and middleware /
by:
(Electronic resources)
Information security intelligence : = cryptographic principles and applications /
by:
(Language materials, printed)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(Electronic resources)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Electronic resources)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(Electronic resources)
Business plans handbook. = a compilation of actual business plans developed by small businesses throughout North America /. Volume 9
by:
(Electronic resources)
Expert oracle and Java Security = programming secure Oracle database applications with Java /
by:
(Electronic resources)
Information security = design, implementation, measurement, and compliance /
by:
(Electronic resources)
Privacy and anonymity in information management systems = new techniques for new practical problems /
by:
(Electronic resources)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Electronic resources)
Information security governance = a practical development and implementation approach /
by:
(Electronic resources)
Information security = a manager's guide to thwarting data thieves and hackers /
by:
(Electronic resources)
Show more
Fewer
Subjects