To see the other types of publications on this topic, follow the link: Unauthorised access.

Books on the topic 'Unauthorised access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 28 books for your research on the topic 'Unauthorised access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Unauthorised access: Physical penetration testing for IT security teams. Chichester, West Sussex, U.K: Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Commission, South African Law. Computer-related crime: Preliminary proposal for reform in respect of unauthorised access to computers, unauthorised modification of computer data and software applications and related procedural aspects. [Pretoria: The Commission, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Woodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rights, United States Congress House Committee on the Judiciary Subcommittee on Civil and Constitutional. Unauthorized access to individual medical records: Hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, second session, on H.R. 5831 ... August 9, 1984. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. Senate. A bill to provide individuals with access to health information of which they are a subject, ensure personal privacy with respect to health-care-related information, impose criminal and civil penalties for unauthorized use of protected health information, to provide for the strong enforcement of these rights, and to protect States' rights. Washington, D.C: U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Allsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Commission, South African Law, ed. Computer related crime: Options for reform in respect of unauthorised access to computers, unauthorised modification of computer data, and software applications and related procedural aspects. [Pretoria]: The Commission, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Unauthorized Access. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sloan, Robert H., and Richard Warner. Unauthorized Access. CRC Press, 2016. http://dx.doi.org/10.1201/b15148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Unauthorized Access (Avalon Mysteries). Thomas Bouregy & Company, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Warner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sloan, Robert. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Warner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Warner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sloan, Robert. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Warner, Richard, and Robert Sloan. Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Unauthorized Aliens and Noncitizens: Access and Eligibility to Federal Benefits. Nova Science Pub Inc, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Argyrakis, Andy. Eminem: Access : The Unauthorized Digital Biography of Eminem : The Narrated Story of the Band (Interview Series). Wheezy Multimedia, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Office, General Accounting. Aviation security: Improved controls needed to prevent unauthorized access at key airports : report to the Secretary of Transportation. Washington, D.C: The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Flanigan, Jessica. Medical Autonomy and Modern Healthcare. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190684549.003.0007.

Full text
Abstract:
Though rights of self-medication needn’t change medical decision-making for most patients, rights of self-medication have the potential to transform other aspects of healthcare as it is currently practiced. For example, if public officials respected patient’s authority to make medical decisions without authorization from a regulator or a physician, then they should also respect patient’s authority to choose to use unauthorized medical devices and medical providers. And many of the same reasons in favor of rights of self-medication and against prohibitive regulations are also reasons to support patient’s rights to access information about pharmaceuticals, including pharmaceutical advertisements. Rights of self-medication may also call for revisions to existing standards of product liability and prompt officials to rethink justifications for the public provision of healthcare.
APA, Harvard, Vancouver, ISO, and other styles
23

Public Service Commission of Canada., ed. Audit of possible unauthorized access to Public Service Commission second language evaluation tests by the Nec Plus Ultra language school: A report. Ottawa: Public Service Commission of Canada, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Public Service Commission of Canada., ed. Audit of possible unauthorized access to Public Service Commission second language evaluation tests by the Nec Plus Ultra language school: A report. Ottawa: Public Service Commission of Canada, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

United States. General Accounting Office, ed. Computer security: Unauthorized access to a NASA scientific network : report to the chairman, Committee on Science, Space, and Technology, House of Representatives. Washington, D.C: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Labat, Patricio Grané, and Naomi Burke. The Protection of Diplomatic Correspondence in the Digital Age. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795940.003.0013.

Full text
Abstract:
This chapter considers the impact of new technology on compliance with obligations under the VCDR. It focuses on the provisions of the VCDR that establish the inviolability of diplomatic archives and correspondence and considers the challenges posed by technology that was not available at the time of the drafting of that treaty but which is now commonplace. It evaluates the ever-present risk of unauthorized digital access to diplomatic correspondence and archives, including by non-State actors (eg WikiLeaks), and examines whether the framework of the VCDR is still adequate to deal with those challenges. The chapter also addresses the submission of protected information obtained in violation of the VCDR as evidence in proceedings before international tribunals, including the International Court of Justice (ICJ). The chapter analyses the admissibility of that evidence and offers answers on how international courts should deal with that information.
APA, Harvard, Vancouver, ISO, and other styles
27

Federal family education loan information system: Weak computer controls increase risk of unauthorized access to sensitive data : report to the Secretary of Education. Washington, D.C: The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Full text
Abstract:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems and components that govern safety must be protected from harmful attacks, unauthorized access, damage, or anything else that might interfere with safety functions. Automotive Cybersecurity: An Introduction to ISO/SAE 21434 provides readers with an overview of the standard developed to help manufacturers keep up with changing technology and cyber-attack methods. ISO/SAE 21434 presents a comprehensive cybersecurity tool that addresses all the needs and challenges at a global level. Industry experts, David Ward and Paul Wooderson, break down the complex topic to just what you need to know to get started including a chapter dedicated to frequently asked questions. Topics include defining cybersecurity, understanding cybersecurity as it applies to automotive cyber-physical systems, establishing a cybersecurity process for your company, and explaining assurances and certification.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography