Books on the topic 'Data processing security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data processing security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.
Find full textAtluri, Vijay, and Pierangela Samarati, eds. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.
Full textInternational Conference on Data Processing in the Field of Social Security (6th 1991 Helsinki, Finland). Data processing for decision-making: VIth International Conference on Data Processing in the Field of Social Security. Geneva: International Social Security Association, 1992.
Find full textInternational Federation of Accountants. Small and Medium Practices Task Force. Controlling computers in business: Physical security. New York, NY: PricewaterhouseCoopers, 2003.
Find full textBulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Find full textMicrocomputer data security: Issues and strategies. New York, NY: Prentice Hall Press, 1986.
Find full textBuck, Edward R. Introduction to data security and controls. 2nd ed. Boston: QED Technical Pub. Group, 1991.
Find full textDoswell, Brian. Managing information security: Achieving BS 7799. London: FT Pitman, 1998.
Find full textInternational Federation of Accountants. Small and Medium Practices Task Force. Controlling computers in business: Logical access security. [United States?]: PricewaterhouseCoopers, 2003.
Find full text1945-, Clark Andrew, and Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. San Francisco: CMP Books, 2005.
Find full textEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Find full textZviran, Moshe. Passwords security: An exploratory study. Monterey, Calif: Naval Postgraduate School, 1990.
Find full textNational Research Council (U.S.). Committee on Assessment of Security Technologies for Transportation. Fusion of security system data to improve airport security. Washington, D.C: National Academies Press, 2007.
Find full textFusion of security system data to improve airport security. Washington, D.C: National Academies Press, 2007.
Find full textNational Research Council (U.S.). Committee on Assessment of Security Technologies for Transportation. Fusion of security system data to improve airport security. Washington, D.C: National Academies Press, 2007.
Find full textHsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textBruce, Glen. Security in distributed computing: Did you lock the door? Saddle River, NJ: Prentice Hall, 1997.
Find full textB, White Gregory, ed. Principles of computer security: CompTIA security+ and beyond. 2nd ed. San Francisco, CA: McGraw-Hill Companies, 2010.
Find full textConklin, Wm Arthur. Principles of computer security: CompTIA security+ and beyond. 2nd ed. San Francisco, CA: McGraw-Hill Companies, 2010.
Find full textSaltman, Roy G. Accuracy, integrity, and security in computerized vote-tallying. Washington, D.C: National Bureau of Standards, 1988.
Find full textSaltman, Roy G. Accuracy, integrity, and security in computerized vote-tallying. Gaithersburg, MD: U.S. Dept of Commerce, National Bureau of Standards, 1988.
Find full textJ, Stang David. Microcomputer security. 6th ed. Washington, D.C: International Computer Security Association, 1992.
Find full textJ, Stang David. Microcomputer security. 3rd ed. Washington, D.C: International Computer Security Association, 1992.
Find full textInternational Conference on Data Processing in the Field of Social Security (4th 1985 Madrid, Spain). New data processing techniques in social security: IVth International Conference on Data Processing in the Field of Social Security, Madrid, 1-3 October 1985. Geneva: General Secretariat of the ISSA, 1985.
Find full textEssinger, James. Computer security in financial organisations. Oxford: Elsevier Advanced Technology, 1990.
Find full textWood, Michael B. Guidelines for physical computer security. Manchester: NCC Publications, 1986.
Find full textBaker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Find full textTelecommunications, United States Veterans Administration Office of Data Management and. ODM&T ADP security handbook. Washington, DC: Veterans Administration, Office of Data Management and Telecommunications, 1986.
Find full textKirk, Hausman Kalani, and Weiss Martin, eds. CompTIA security+ exam cram. 2nd ed. Indianapolis, Ind: Que Pub., 2009.
Find full text1956-, Atluri Vijay, and Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Find full textMiller, Donald G. Security Guidelines for Electronic Data Processing Operations. Bank Administration Inst, 1985.
Find full textAmerican Institute of Certified Public Accountants., ed. Information security. Jersey City, NJ: American Institute of Certified Public Accountants, 1995.
Find full textS, Snoyer Robert, Fischer Glenn A, and Chantico Publishing Co, eds. Managing microcomputer security. Homewood, Ill: Business One Irwin, 1993.
Find full textWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller, and Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Find full textSaini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.
Find full textSaini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.
Find full textSaini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.
Find full textComputer Security, Electronic Data Processing, Audit and Control. Elsevier Science, 1990.
Find full textSaini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.
Find full textBrocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.
Find full textData processing for decision-making: VIth International Conference on Data Processing in the Field of Social Security (Social security documentation). International Social Security Association, 1992.
Find full text