To see the other types of publications on this topic, follow the link: Breaches.

Books on the topic 'Breaches'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Breaches.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Daswani, Neil, and Moudy Elbayadi. Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

S, Logweller Cary, ed. Identity theft breaches. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Centre, National Computing, ed. The Information Security Breaches Survey 1996. National Computing Centre, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Foster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Rand Corporation, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Van Roosebeke, Bert. State Liability for Breaches of European Law. DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Krausz, Michael. Managing Information Security Breaches: Studies from Real Life. IT Governance Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Great Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. Stationery Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Library, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. President and Fellows of Harvard College, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

United States. Government Accountability Office, ed. Trends in Nunn-McCurdy cost breaches for major Defense acquisition programs. U.S. Govt. Accountability Office, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Russell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

1958-, Harinck G., and Krabbendam Hans 1964-, eds. Breaches and bridges: Reformed subcultures in the Netherlands, Germany, and the United States. VU Uitgeverij, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ombudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). Republic of Vanuatu, Office of the Ombudsman, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bridging Love's Breaches. iUniverse, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Davidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Davidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Flanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Personal identifiable information and data breaches. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Elbayadi, Moudy, and Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ho, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ho, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Committee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ho, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Danae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.

Full text
Abstract:
Chapter 5 addresses unilateral treaty law responses available to treaty parties against breaches of transit obligations therein, and examines whether the exceptio non adimpleti contractus has a separate existence to the rule concerning responses to material breaches under the law of treaties. It illustrates that there may be special rules in treaties that displace treaty law responses under customary international law. The analysis distinguishes treaty law responses (and the exceptio non adimpleti contractus) from countermeasures. It demonstrates that even though unilateral responses under the
APA, Harvard, Vancouver, ISO, and other styles
34

Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Scholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Publishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Moore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ricento, Thomas, Yael Peled, and Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Data Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Committee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Information Security Breaches: Avoidance and treatment based on ISO27001. IT Governance Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ricento, Thomas, Yael Peled, and Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Walker, John, and Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Breaches and bridges: German foreign policy in turbulent times. World Scientific, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!