Libros sobre el tema "Breaches"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Breaches".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Daswani, Neil, and Moudy Elbayadi. Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Texto completoS, Logweller Cary, ed. Identity theft breaches. Nova Science Publishers, 2009.
Buscar texto completoY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Buscar texto completoY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Buscar texto completoCentre, National Computing, ed. The Information Security Breaches Survey 1996. National Computing Centre, 1996.
Buscar texto completoFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.
Buscar texto completoArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Rand Corporation, 2014.
Buscar texto completoVan Roosebeke, Bert. State Liability for Breaches of European Law. DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Texto completoWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Texto completoRita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.
Buscar texto completoKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. IT Governance Pub., 2010.
Buscar texto completoGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. Stationery Office, 2002.
Buscar texto completoLibrary, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. President and Fellows of Harvard College, 1997.
Buscar texto completoUnited States. Government Accountability Office, ed. Trends in Nunn-McCurdy cost breaches for major Defense acquisition programs. U.S. Govt. Accountability Office, 2011.
Buscar texto completoRussell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. New Riders, 2002.
Buscar texto completo1958-, Harinck G., and Krabbendam Hans 1964-, eds. Breaches and bridges: Reformed subcultures in the Netherlands, Germany, and the United States. VU Uitgeverij, 2000.
Buscar texto completoOmbudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). Republic of Vanuatu, Office of the Ombudsman, 1999.
Buscar texto completoDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Buscar texto completoDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Buscar texto completoFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Buscar texto completoData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Buscar texto completoFlanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.
Texto completoPersonal identifiable information and data breaches. Nova Science Publishers, 2009.
Buscar texto completoElbayadi, Moudy, and Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.
Buscar texto completoHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Buscar texto completoHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Buscar texto completoHo, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.
Buscar texto completoCommittee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Buscar texto completoWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Buscar texto completoHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Buscar texto completoKelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.
Buscar texto completoDanae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.
Texto completoInformation Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Buscar texto completoScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Buscar texto completoPublishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.
Buscar texto completoMoore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRicento, Thomas, Yael Peled, and Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.
Buscar texto completoData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Buscar texto completoCommittee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Buscar texto completoInformation Security Breaches: Avoidance and treatment based on ISO27001. IT Governance Pub., 2009.
Buscar texto completoJustice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRicento, Thomas, Yael Peled, and Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoWalker, John, and Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.
Buscar texto completoBreaches and bridges: German foreign policy in turbulent times. World Scientific, 2017.
Buscar texto completo