Data protection.
Overview
Works: | 196 works in 125 publications in 125 languages |
---|
Titles
Disaster recovery planning :strategies for protecting critical information /
by:
(Language materials, printed)
Computer privacy annoyances :how to avoid the most annoying invasions of your personal and online privacy /
by:
(Language materials, printed)
Information hiding :steganography and watermarking : attacks and countermeasures /
by:
(Language materials, printed)
Hacking exposed Cisco networks :Cisco security secrets & solutions /
by:
(Language materials, printed)
The shellcoder's handbook :discovering and exploiting security holes /
by:
(Language materials, printed)
Digital data integrity :the evolution from passive protection to active management /
by:
(Electronic resources)
Digital data integrity :the evolution from passive protection to active management /
by:
(Language materials, printed)
The executive guide to information security :threats, challenges, and solutions /
by:
(Language materials, printed)
The business case for network security :advocacy, governance, and ROI /
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection /
by:
(Language materials, printed)
Information securitydesign, implementation, measurement, and compliance /
by:
(Electronic resources)
Business plans handbook.a compilation of actual business plans developed by small businesses throughout North America /Volume 9
by:
(Electronic resources)
Information securitya manager's guide to thwarting data thieves and hackers /
by:
(Electronic resources)
The future of identity in the information societychallenges and opportunities /
by:
(Electronic resources)
Multimedia security :digital image and video watermarking : HMM based transform domain watermarking in image & video /
by:
(Language materials, printed)
Counter hack reloaded :a step-by-step guide to computer attacks and effective defenses /
by:
(Language materials, printed)
Privacy and anonymity in information management systemsnew techniques for new practical problems /
by:
(Electronic resources)
Protecting your health privacya citizen's guide to safeguarding the security of your medical information /
by:
(Electronic resources)
Preventing good people from doing bad thingsimplementing least privilege /
by:
(Electronic resources)
Expert oracle and Java Securityprogramming secure Oracle database applications with Java /
by:
(Electronic resources)
Collaborative financial infrastructure protectiontools, abstractions, and middleware /
by:
(Electronic resources)
Information security management metricsa definitive guide to effective security monitoring and measurement /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurancenew technologies /
by:
(Electronic resources)
Privacy protection measures and technologies in business organizationsaspects and standards /
by:
(Electronic resources)
Information security, coding theory and related combinatoricsinformation coding and combinatorics /
by:
(Electronic resources)
Information security governancea practical development and implementation approach /
by:
(Electronic resources)
Advanced persistent threatunderstanding the danger and how to protect your organization /
by:
(Electronic resources)
Data hidingexposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Electronic resources)
Data governancehow to design, deploy, and sustain an effective data governance program /
by:
(Electronic resources)
Information theoretic security7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Electronic resources)
Passive and active measurement15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(Electronic resources)
The privacy engineer's manifestogetting from policy to code to QA to value /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(Electronic resources)
Advances in information and computer security9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Electronic resources)
Security de-engineeringsolving the problems in information risk management /
by:
(Electronic resources)
Security protocols XXII22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(Electronic resources)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
Cyber security and privacythird Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers /
by:
(Electronic resources)
Total information risk managementmaximizing the value of data and information assets /
by:
(Electronic resources)
Information systems security10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(Electronic resources)
Attribute-based credentials for trustidentity in the information society /
by:
(Electronic resources)
Enhancing information security and privacy by combining biometrics with cryptography
by:
(Electronic resources)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Electronic resources)
Self- and co-regulation in cybercrime, cybersecurity and national security
by:
(Electronic resources)
Privacy in a digital, networked worldtechnologies, implications and solutions /
by:
(Electronic resources)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(Electronic resources)
Physical and data-link security techniques for future communication systems
by:
(Electronic resources)
Data protection on the movecurrent developments in ICT and privacy/data protection /
by:
(Electronic resources)
Application of big data for national securitya practitioner's guide to emerging technologies /
by:
(Electronic resources)
Risk centric threat modelingprocess for attack simulation and threat analysis /
by:
(Electronic resources)
Virtuality and capabilities in a world of ambient intelligencenew challenges to privacy and data protection /
by:
(Electronic resources)
Data thieves in actionexamining the international market for stolen personal information /
by:
(Electronic resources)
Elements of cloud storage securityconcepts, designs and optimized practices /
by:
(Electronic resources)
Multimedia forensics and securityfoundations, innovations, and applications /
by:
(Electronic resources)
Secure ICT service provisioning for cloud, mobile and beyondESARIS: the answer to the demands of industrialized IT production balancing between buyers and providers /
by:
(Electronic resources)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations /
by:
(Language materials, printed)
Information technology risk management and compliance in modern organizations
by:
(Electronic resources)
Security and privacy in cyber-physical systemsfoundations, principles, and applications /
by:
(Electronic resources)
Applications of data management and analysiscase studies in social networks and beyond /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Electronic resources)
Emerging technologies for authorization and authenticationsecond International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019 : proceedings /
by:
(Electronic resources)
The cloud security ecosystemtechnical, legal, business and management issues /
by:
(Electronic resources)
Implementing computational intelligence techniques for security systems design
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Security protocols XXVII27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
by:
(Electronic resources)
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
by:
(Electronic resources)
Serverless securityunderstand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /
by:
(Electronic resources)
Linking sensitive datamethods and techniques for practical privacy-preserving information sharing /
by:
(Electronic resources)
Advanced ASP.NET Core 3 Securityunderstanding hacks, attacks, and vulnerabilities to secure your website /
by:
(Electronic resources)
Cyberspace mimic defensegeneralized robust control and endogenous security /
by:
(Electronic resources)
Pro Google cloud automationwith Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins /
by:
(Electronic resources)
Machine learning and intelligent communications5th International Conference, MLICOM 2020, Shenzhen, China, September 26-27, 2020 : proceedings /
by:
(Electronic resources)
Digital transformation, cyber security and resilience of modern societies
by:
(Electronic resources)
Data hiding techniques in Windows OSa practical approach to investigation and defense /
by:
(Electronic resources)
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
by:
(Electronic resources)
Improving information security practices through computational intelligence
by:
(Electronic resources)
New methods and tools for intelligent data processing and information security systems
by:
(Electronic resources)
Privacy concerns surrounding personal information sharing on health and fitness mobile apps
by:
(Electronic resources)
Data governance and data managementcontextualizing data governance drivers, technologies, and tools /
by:
(Electronic resources)
Data governance for managersthe driver of value stream optimization and a pacemaker for digital transformation /
by:
(Electronic resources)
Data stewardshipan actionable guide to effective data management and data governance /
by:
(Electronic resources)
Auditing corporate surveillance systemsresearch methods for greater transparency /
by:
(Electronic resources)
Big data, algorithms and food safetya legal and ethical approach to data ownership and data governance /
by:
(Electronic resources)
What people leave behindmarks, traces, footprints and their relevance to knowledge society /
by:
(Electronic resources)
Future data and security engineering : big data, security and privacy, smart city and industry 4.0 applications9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022 : proceedings /
by:
(Electronic resources)
Fraud prevention, confidentiality, and data security for modern businesses
by:
(Electronic resources)
Applications of machine learning and deep learning for privacy and cybersecurity
by:
(Electronic resources)
Data privacy and crowdsourcinga comparison of selected problems in China, Germany and the United States /
by:
(Electronic resources)
Cyber intelligence-driven riskhow to build and use cyber intelligence for business risk decisions /
by:
(Electronic resources)
Security and privacy in the Internet of thingsarchitectures, techniques, and applications /
by:
(Electronic resources)
Show more
Fewer
Subjects