Books on the topic 'Data security and protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data security and protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1952-, Gordon John, ed. Practical data security. Aldershot, England: Ashgate, 1993.
Find full textBrocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.
Find full textZiegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.
Full textAmerican Bar Association. Section of Antitrust Law., ed. Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.
Find full textAtluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.
Find full textY, Chow Stephen, Goldstone David, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Data security & identity theft. Boston, MA: MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Find full textCanada, Canada Government Services, ed. Information technology security handbook. Ontario: Government Services Canada, 1993.
Find full textInternational Conference on Data Mining (9th 2008 Cadiz, Spain). Data mining IX: Data mining, protection, detection and other security technologies. Edited by Zanasi A. Southampton: WIT, 2008.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textInternational Conference on Data Mining (9th 2008 Cadiz, Spain). Data mining IX: Data mining, protection, detection and other security technologies. Edited by Zanasi A. Southampton: WIT, 2008.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textGratton, Pierre. La protection des ressources informatiques. Paris, France, Editions d'organisation: Editions G. Vermette, 1985.
Find full textPerlman, C. Max, Kathleen M. Porter, Shannon Choy-Seymour, and Mary-Pat Cormier. Fundamentals of data security law. Boston, MA: MCLE New England, 2013.
Find full textPerlman, C. Max, Sara E. Cable, Kathleen M. Porter, and James T. Towne. Fundamentals of data security law. [Boston, MA]: MCLE, 2012.
Find full textMcCann, Tiffany. Information security: Keeping data safe. Morristown, NJ: FEI Research Foundation, 2002.
Find full textGanger, Devin L. Mastering system center Data protection manager 2007. Indianapolis, Ind: Wiley Pub., 2008.
Find full textGuerra, Peter, and Drew Farris. Data Security for Modern Enterprises: Data Security in the World of Cloud Computing, Big Data, Data Science, and Modern Attacks. O'Reilly Media, Incorporated, 2017.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2020.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2017.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Taylor & Francis Group, 2020.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2017.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2020.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2020.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2017.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2020.
Find full textGuise, Preston de. Data Protection: Ensuring Data Availability. Auerbach Publishers, Incorporated, 2017.
Find full textDeloitte Haskins & Sells., ed. Computers and data protection. Deloitte Haskins & Sells, 1988.
Find full textBrocx, W. H. J. Data Security Manual: Guidelines and Procedures for Data Protection. D Reidel Pub Co, 1985.
Find full textBrocx, W. H. J. Data Security Manual: Guidelines and Procedures for Data Protection. D Reidel Pub Co, 1985.
Find full textBrocx, W. H. J. Data Security Manual: Guidelines and Procedures for Data Protection. D Reidel Pub Co, 1985.
Find full textCommittee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Data Security: The Discussion Draft of Data Protection Legislation. Independently Published, 2019.
Find full textW.H.J. Brockx (Compiler), M. C. Kersten (Compiler), B.G.H. van Liemt (Compiler), and A. van Zanten (Compiler), eds. Data Security Manual: Guidelines and Procedures for Data Protection. Springer, 1985.
Find full textFriedman, Ellen, and Ted Dunning. Sharing Big Data Safely: Managing Data Security. O'Reilly Media, Incorporated, 2015.
Find full textFriedman, Ellen, and Ted Dunning. Sharing Big Data Safely: Managing Data Security. O'Reilly Media, Incorporated, 2015.
Find full textHeard, Nicholas, Patrick Rubin-Delanchy, and Melissa Turcotte. Data Science for Cyber-Security. World Scientific Publishing Co Pte Ltd, 2016.
Find full textFahy, Bob. Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals. Elsevier Science & Technology Books, 2014.
Find full textFahy, Bob. Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals. Elsevier, 2014.
Find full textAljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.
Find full text