To see the other types of publications on this topic, follow the link: Sensitive date.

Books on the topic 'Sensitive date'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Sensitive date.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Photopoulos, Constantine. Managing catastrophic loss of sensitive data. Syngress Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Claire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruylant, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Great Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Daniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2nd ed. Georgia State Univ. Business Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Computer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Computer Security Analysts, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

E, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Sage Publications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ficco, Massimo, and Gianni D'Angelo, eds. Artificial Intelligence Techniques for Analysing Sensitive Data in Medical Cyber-Physical Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-70775-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Staszkiewicz, Maddison. Using Online Surveys to Capture Time-Sensitive Data in a Low-Resource Setting. SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529601831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Syyed, Huda. How to Conduct Intersectional Feminist Research with Sensitive Data in a Precarious Setting. SAGE Publications Ltd, 2025. https://doi.org/10.4135/9781036222772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

N, Gibbs John, Lewis Marieke, Library of Congress. Federal Research Division, and United States. National Aeronautics and Space Administration. Office of Inspector General, eds. Laws governing the protection of sensitive but unclassified information: A report. Federal Research Division, Library of Congress, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mewes, Hans-Werner. Schnelle Identifizierung von Peptiden durch sensitive Bestimmung ihrer Aminosäurezusammensetzung und Zugriff auf Sequenzdatenbanken. Intemann, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

United States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. U.S. Dept. of Energy, Office of Inspector General, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

van der Sloot, Bart, and Sascha van Schendel. The Boundaries of Data. Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.

Full text
Abstract:
The legal domain distinguishes between different types of data and attaches a different level of protection to each of them. Thus, non-personal data are left largely unregulated, while privacy and data protection rules apply to personal data or personal information. There are stricter rules for processing sensitive personal data than for ‘ordinary’ personal data, and metadata or communications data are regulated differently than content communications data. Technological developments challenge these legal categorisations on at least three fronts: First, the lines between the categories are bec
APA, Harvard, Vancouver, ISO, and other styles
17

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

New York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. Office of the State Comptroller, Division of State Services, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

N, Gibbs John, Lewis Marieke, and Library of Congress. Federal Research Division., eds. Laws and regulations governing the protection of sensitive but unclassified information, a report. The Division, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rees, Elaine. Threatened, endangered & sensitive species affected by livestock production: A preliminary survey of data available in the western states. Audubon Society of Portland, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Alan, Cooper. The Mourne Environmentally Sensitive Area land use data base: Report to the Department of Agriculture for Northern Ireland. [Department of Environmental Studies, University of Ulster], 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Paragi, Beata. Challenges in Using Online Surveys for Research Involving Delicate/Sensitive Topics: Data Protection Practices of European NGOs Operating in the Global South. SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529604146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

United States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Klausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. Gotham Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Klausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. Gotham Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

United States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. GAO, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Managing Catastrophic Loss of Sensitive Data. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-239-3.x0001-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

McNamara, Kathryn. Defense Data Network: usage sensitive billing. 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Neumann, Caryn E. Sexual Crime. ABC-CLIO, LLC, 2009. http://dx.doi.org/10.5040/9798216013532.

Full text
Abstract:
A contemporary, fact-filled resource on the historical, legal, medical, and political aspects of a wide variety of sexual crimes. Authoritative and informative, Sexual Crime: A Reference Handbook offers a thoroughly up-to-date report on an issue of extraordinary urgency. It is an expert introduction to a variety of often misunderstood crimes. Sexual Crime begins with a background chapter outlining the causes and definitions of sexual crime, legal and cultural attitudes over the past three centuries, and common myths surrounding this sensitive subject. It then offers wide ranging coverage of is
APA, Harvard, Vancouver, ISO, and other styles
38

Fox, James A. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Fox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Fox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Britain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, The, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Stelzmann, Daniela, and Josephine Ischebeck, eds. Child Sexual Abuse and the Media. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748904403.

Full text
Abstract:
Spectacular cases of child sexual abuse (CSA) dominate media coverage again and again, shaping our knowledge about a topic that is as sensitive as it is taboo. To date, a scholarly overview of the current state of media coverage of SBC has been lacking. This book attempts to shed light on the connections between SBCs and the media in a variety of ways, incorporating different studies and perspectives from practitioners. It thus provides a comprehensive overview of relevant issues raised in the context of CSA and the media.
APA, Harvard, Vancouver, ISO, and other styles
43

Britain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) (Amendment) Order 2010. Stationery Office, The, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Bunner, James. Password Book: Sensitive Data in One Place / 110 Pages /. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Committee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Daniel, Wayne W. Collecting Sensitive Data by Randomized Response: An Annotated Bibliography. 2nd ed. Georgia State Univ Pr, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Routing of Time-Sensitive Data in Mobile and HOC Networks. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Doing research on sensitive topics. Sage Publications, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Survey methodology: An innovative technique for estimating sensitive survey items. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Data acquisition system for linear position sensitive detector based neutron diffractometer. Bhabha Atomic Research Centre, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!