Data protection.
概要
作品: | 196 作品在 125 項出版品 125 種語言 |
---|
書目資訊
Computer privacy annoyances :how to avoid the most annoying invasions of your personal and online privacy /
by:
(書目-語言資料,印刷品)
Information hiding :steganography and watermarking : attacks and countermeasures /
by:
(書目-語言資料,印刷品)
Digital data integrity :the evolution from passive protection to active management /
by:
(書目-語言資料,印刷品)
Multimedia security :digital image and video watermarking : HMM based transform domain watermarking in image & video /
by:
(書目-語言資料,印刷品)
Counter hack reloaded :a step-by-step guide to computer attacks and effective defenses /
by:
(書目-語言資料,印刷品)
Privacy and anonymity in information management systemsnew techniques for new practical problems /
by:
(書目-電子資源)
Protecting your health privacya citizen's guide to safeguarding the security of your medical information /
by:
(書目-電子資源)
Expert oracle and Java Securityprogramming secure Oracle database applications with Java /
by:
(書目-電子資源)
Collaborative financial infrastructure protectiontools, abstractions, and middleware /
by:
(書目-電子資源)
Information security management metricsa definitive guide to effective security monitoring and measurement /
by:
(書目-電子資源)
Privacy protection measures and technologies in business organizationsaspects and standards /
by:
(書目-電子資源)
Information security, coding theory and related combinatoricsinformation coding and combinatorics /
by:
(書目-電子資源)
Advanced persistent threatunderstanding the danger and how to protect your organization /
by:
(書目-電子資源)
Data hidingexposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(書目-電子資源)
Data governancehow to design, deploy, and sustain an effective data governance program /
by:
(書目-電子資源)
Information theoretic security7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(書目-電子資源)
Passive and active measurement15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(書目-電子資源)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(書目-電子資源)
Security protocols XXII22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(書目-電子資源)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
Total information risk managementmaximizing the value of data and information assets /
by:
(書目-電子資源)
Information systems security10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(書目-電子資源)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(書目-電子資源)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(書目-電子資源)
Application of big data for national securitya practitioner's guide to emerging technologies /
by:
(書目-電子資源)
Virtuality and capabilities in a world of ambient intelligencenew challenges to privacy and data protection /
by:
(書目-電子資源)
Data thieves in actionexamining the international market for stolen personal information /
by:
(書目-電子資源)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(書目-電子資源)
Security and privacy in cyber-physical systemsfoundations, principles, and applications /
by:
(書目-電子資源)
Applications of data management and analysiscase studies in social networks and beyond /
by:
(書目-電子資源)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(書目-電子資源)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Security protocols XXVII27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
by:
(書目-電子資源)
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
by:
(書目-電子資源)
Linking sensitive datamethods and techniques for practical privacy-preserving information sharing /
by:
(書目-電子資源)
Advanced ASP.NET Core 3 Securityunderstanding hacks, attacks, and vulnerabilities to secure your website /
by:
(書目-電子資源)
Pro Google cloud automationwith Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins /
by:
(書目-電子資源)
Data hiding techniques in Windows OSa practical approach to investigation and defense /
by:
(書目-電子資源)
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
by:
(書目-電子資源)
New methods and tools for intelligent data processing and information security systems
by:
(書目-電子資源)
Privacy concerns surrounding personal information sharing on health and fitness mobile apps
by:
(書目-電子資源)
Data governance and data managementcontextualizing data governance drivers, technologies, and tools /
by:
(書目-電子資源)
Data governance for managersthe driver of value stream optimization and a pacemaker for digital transformation /
by:
(書目-電子資源)
Data stewardshipan actionable guide to effective data management and data governance /
by:
(書目-電子資源)
Big data, algorithms and food safetya legal and ethical approach to data ownership and data governance /
by:
(書目-電子資源)
What people leave behindmarks, traces, footprints and their relevance to knowledge society /
by:
(書目-電子資源)
Data privacy and crowdsourcinga comparison of selected problems in China, Germany and the United States /
by:
(書目-電子資源)
Cyber intelligence-driven riskhow to build and use cyber intelligence for business risk decisions /
by:
(書目-電子資源)
Security and privacy in the Internet of thingsarchitectures, techniques, and applications /
by:
(書目-電子資源)
更多
較少的
主題