Academic literature on the topic 'Data security and protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data security and protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data security and protection"
Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.
Full textBegum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Full textMALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.
Full textA. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.
Full textIgnisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.
Full textQureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.
Full textMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Full textHighland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.
Full textAtri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.
Full textShahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.
Full textDissertations / Theses on the topic "Data security and protection"
Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Full textDepartment of Computer Science
Ammar, Bassem AbuBakr. "Error protection and security for data transmission." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421640.
Full textOduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.
Full textBenson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.
Full textMai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Full textTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Full textSalles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.
Full textThesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
Cannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.
Full textDe, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.
Full textKane, Douglas Robert. "Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKane.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
Books on the topic "Data security and protection"
1952-, Gordon John, ed. Practical data security. Aldershot, England: Ashgate, 1993.
Find full textBrocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.
Find full textZiegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.
Full textAmerican Bar Association. Section of Antitrust Law., ed. Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.
Find full textAtluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.
Find full textY, Chow Stephen, Goldstone David, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Data security & identity theft. Boston, MA: MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Find full textBook chapters on the topic "Data security and protection"
Garbis, Jason, and Jerry W. Chapman. "Data Protection." In Zero Trust Security, 163–72. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_13.
Full textLenhard, Thomas H. "Data Protection and Data Security." In Data Security, 3–4. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_2.
Full textLakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies, 173–230. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.
Full textOts, Karl. "Workload Protection – Data." In Azure Security Handbook, 77–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_5.
Full textIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.
Full textIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.
Full textIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 223–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_95.
Full textWeber, Peter, Roland Gabriel, Thomas Lux, and Katharina Menke. "Data Security and Data Protection." In Basics in Business Informatics, 281–308. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35859-4_11.
Full textLong, Ian. "Data Protection and Data Security." In The Complete Company Policies, 41–64. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003258995-7.
Full textDegoulet, Patrice, and Marius Fieschi. "Security and Data Protection." In Introduction to Clinical Informatics, 193–203. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-0675-0_15.
Full textConference papers on the topic "Data security and protection"
Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning, 37. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.
Full text"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.
Full textShi, Yue. "Data Security and Privacy Protection in Public Cloud." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622531.
Full textSu, Chunli. "Big Data Security and Privacy Protection." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00030.
Full textAparajit, Srushti, Rashi Shah, Riddhi Chopdekar, and Rupali Patil. "Data Protection: The Cloud Security Perspective." In 2022 3rd International Conference for Emerging Technology (INCET). IEEE, 2022. http://dx.doi.org/10.1109/incet54531.2022.9825151.
Full textJiang, Yixiang, Yuangen Xu, Qi Xu, Limei Fang, and Cong Lin. "Tobacco Industry Data Security Protection System." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821674.
Full textZhang, Dongpo. "Big Data Security and Privacy Protection." In 8th International Conference on Management and Computer Science (ICMCS 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icmcs-18.2018.56.
Full textVázquez-Naya, Jose. "Protection and security of medical data." In MOL2NET'21, Conference on Molecular, Biomedical & Computational Sciences and Engineering, 7th ed. Basel, Switzerland: MDPI, 2021. http://dx.doi.org/10.3390/mol2net-07-11848.
Full textBoehnen, Christopher, David Bolme, and Patrick Flynn. "Biometrics IRB best practices and data protection." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181981.
Full textKan, Senwen, Jennifer Dworak, and James George Dunham. "Echeloned IJTAG data protection." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835558.
Full textReports on the topic "Data security and protection"
Adams, C. Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). RFC Editor, December 1998. http://dx.doi.org/10.17487/rfc2479.
Full textPark, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.
Full textStankovic, Mirjana, and Agustín Ignacio Filippo. Global Value Chain Data for Mexico in the Automotive and Electronics Sectors. Inter-American Development Bank, September 2021. http://dx.doi.org/10.18235/0003664.
Full textGautrais, Vincent, and Nicolas Aubin. Assessment Model of Factors Relating to Data Flow: Instrument for the Protection of Privacy as well as Rights and Freedoms in the Development and Use of Artificial Intelligence. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, March 2022. http://dx.doi.org/10.61737/haoj6662.
Full textIdris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/k4d.2021.103.
Full textDeb, Shourjya, and Virginie Baudais. The Challenges of Data Collection in Conflict-affected Areas: A Case Study in the Liptako-Gourma Region. Stockholm International Peace Research Institute, October 2022. http://dx.doi.org/10.55163/vwim3307.
Full textAuthor, Not Given. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Office of Scientific and Technical Information (OSTI), September 2001. http://dx.doi.org/10.2172/788789.
Full textAmarante, Verónica, Rodrigo Arim, and Andrés Dean. Protecting Workers against Unemployment in Uruguay. Inter-American Development Bank, October 2011. http://dx.doi.org/10.18235/0011349.
Full textRosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.
Full textLewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.
Full text