Books on the topic 'Information security legislations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information security legislations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Torp, Jeffrey. Information security: Satisfying regulatory requirements. AlexInformation, 2003.
Find full textBlyth, Andrew. Information Assurance: Security in the Information Environment. Springer London, 2006.
Find full textTorp, Jeffrey. Information security: Guidance, standards, and issuances. AlexInformation, 2006.
Find full textD, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.
Find full textLewis, Ryan F. Information security laws: An introduction. Nova Science Publishers, 2011.
Find full textGifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.
Find full textGifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.
Find full textUnited States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.
Find full textUnited States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.
Find full textUnited States. Bureau of Justice Statistics and Search Group, eds. Criminal history record information: Compendium of state privacy and security legislation, 1992. U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, 1992.
Find full textMilone, Mark G. Information security law: Control of digital assets. Law Journal Press, 2006.
Find full textShitov, Viktor. Information content management. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1842520.
Full textDivision, United States Marshals Service Executive Services. Classified national security information: Reference booklet. U.S. Dept. of Justice, Marshals Service, Executive Services Division, 1999.
Find full textWoodard, Paul L. Compendium of state privacy and security legislation, 1984 edition: Overview : privacy and security of criminal history information. U.S. Dept. of Justice, Bureau of Justice Statistics, 1985.
Find full textWoodard, Paul L. Compendium of state privacy and security legislation, 1984 edition: Overview : privacy and security of criminal history information. U.S. Dept. of Justice, Bureau of Justice Statistics, 1985.
Find full textF, McLaughlin Peter, and Tomaszewski John, eds. Privacy, security and information management: An overview. American Bar Assocation, Section of Business Law, 2011.
Find full textUkraïny, Derz︠h︡avnyĭ komitet arkhiviv. Archival Legislation of Ukraine: 1991-2003. 2nd ed. Derz︠h︡avnyĭ komitet arkhiviv Ukraïny, 2004.
Find full textM, Matwyshyn Andrea, ed. Harboring data: Information security, law, and the corporation. Stanford Law Books, 2009.
Find full textM, Matwyshyn Andrea, ed. Harboring data: Information security, law, and the corporation. Stanford Law Books, 2009.
Find full textKen, Rubin. Using Canadian freedom of information legislation: A public interest researcher's experiences. Ken Rubin, 1990.
Find full textNewman, Elizabeth L. Security clearance law and procedure. Dewey Publications, Inc., 2014.
Find full textCohen, Sheldon I. Security clearances and the protection of national security information: Law and procedures. Defense Personnel Security Research Center, 1999.
Find full textHossein, Bidgoli, ed. Global perspectives in information security: Legal, social and international issues. J. Wiley & Sons, 2008.
Find full textauthor, Sim U.-min, ed. Tijit'ŏl t'ŭraensŭp'omeisyŏn kwa chŏngbo poho: Digital transformation information security. Pagyŏngsa, 2019.
Find full textInstitute, Pennsylvania Bar, ed. Health information technology privacy & security update: HIPAA "stimulated". Pennsylvania Bar Institute, 2009.
Find full textOffice, General Accounting. Information security: Subcommittee post-hearing questions concerning the additional actions needed to implement reform legislation. U.S. GAO, 2002.
Find full textOffice, General Accounting. Information security: Corps of Engineers making improvements, but weaknesses continue. The Office, 2002.
Find full textInstitute, Pennsylvania Bar. Legal issues in information system security: Privacy protection & piracy prevention. Pennsylvania Bar Institute, 2000.
Find full textGaycken, Sandro, Jörg Krüger, and Bertram Nickolay. The secure information society: Ethical, legal and political challenges. Springer, 2013.
Find full textInstitute, Pennsylvania Bar. How to protect & safeguard customer information. Pennsylvania Bar Institute, 2001.
Find full text1970-, Kiefer Kimberly, ed. Information security: A legal, business, and technical handbook. Section of Science & Technology Law, American Bar Association, 2004.
Find full textPrusakov, I︠u︡ M. Gosudarstvennoe obespechenie informat︠s︡ionnoĭ bezopasnosti Rossiĭ. RostIzdat, 2002.
Find full textPrusakov, I︠U︡ M. Gosudarstvennoe obespechenie informat︠s︡ionnoĭ bezopasnosti Rossii. RostIzdat, 2002.
Find full textWylder, John. A focus on information security: Current status, outlook & legal issues. Information Management Forum, 1996.
Find full textOffice, General Accounting. Information security: Federal agency use of nondisclosure agreements : fact sheet for the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations. U.S. General Accounting Office, 1991.
Find full textFurnell, Steven. Cybercrime: Vandalising the information society. Addison Wesley, 2002.
Find full textRodrigues, Louis J. Classified information nondisclosure agreements: Statement of Louis J. Rodrigues ... before the Subcommittee on Legislation and National Security, Committee on Government Operations, United States House of Representatives. U.S. General Accounting Office, 1988.
Find full textCorasaniti, Giuseppe. Esperienza giuridica e sicurezza informatica. Giuffrè, 2003.
Find full textSerwin, Andrew. Information security and privacy: A guide to international law and compliance. 2nd ed. Thomson/West, 2009.
Find full textChow, Stephen Y. E-commerce and communications: Transactions in digital information. LexisNexis, 2002.
Find full textLibrary of Congress. Major Issues System, ed. Computer security issues: The Computer Security Act of 1987. Library of Congress, Congressional Research Service, Major Issues System, 1987.
Find full textAmerican Bar Association. Railway and Airline Labor Law Committee, ed. E-health, privacy, and security law. Bloomberg, BNA Books, 2016.
Find full textWingfield, Thomas C. The law of information conflict: National security law in cyberspace. Aegis Research Corp., 2000.
Find full textLeif, Ekstrom, ed. The Bank Secrecy Act: Information sharing and security efforts. Nova Science Publishers, 2009.
Find full textRusskevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.
Full textFeijó, Carlos. A produção de informações de segurança no Estado Democrático de Direito: O caso angolano. Principia, Publicações Universitárias e Científicas, 2003.
Find full textS, Goldberg Alan, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Health care and information technology: Health care information, internet/intranet, and other technology, confidentiality and telemedicine. MCLE, 1997.
Find full text