Gotowa bibliografia na temat „Information security legislations”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Information security legislations”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Information security legislations"
Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.
Pełny tekst źródłaTang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.
Pełny tekst źródłaParraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.
Pełny tekst źródłaAl-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.
Pełny tekst źródła余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.
Pełny tekst źródłaGupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.
Pełny tekst źródłaTretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.
Pełny tekst źródłaVikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.
Pełny tekst źródłaYANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.
Pełny tekst źródłaWeerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Pełny tekst źródłaRozprawy doktorskie na temat "Information security legislations"
Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Pełny tekst źródłaBanerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Pełny tekst źródłaDesai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Pełny tekst źródłaSjöström, Elin. "Ett lapptäcke av säkerhetsskydd över Sverige : Utmaningar för civila verksamheter vid applicering av säkerhetsskyddsanalys för stärkt nationell säkerhet." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159636.
Pełny tekst źródłaКунєв, Ю. Д. "Правове забезпечення інформаційної безпеки як предмет правового дослідження". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53719.
Pełny tekst źródłaSkolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.
Pełny tekst źródłaKampourakis, Ioannis [Verfasser]. "Dialectics of Transparency and Secrecy in the Information Age : The Role of Whistleblowing Legislation in the Regulatory Governance of Markets and in National Security / Ioannis Kampourakis." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1195081014/34.
Pełny tekst źródłaLedenstam, David, and Gustav Jonasson. "Kom ihåg att glömma bort : Fallstudie av organisationers förändringsarbete ur ett informationssäkerhetsperspektiv." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355584.
Pełny tekst źródłaRatkevičienė, Sigita. "Šengeno informacinės sitemos vaidmuo ir teisinis reglamentavimas užtikrinant valstybių narių saugumą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_184131-28545.
Pełny tekst źródłaKroft, Karel. "Audit cloudových služeb pro malé a střední podniky." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-203958.
Pełny tekst źródłaKsiążki na temat "Information security legislations"
Torp, Jeffrey. Information security: Satisfying regulatory requirements. AlexInformation, 2003.
Znajdź pełny tekst źródłaBaxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.
Znajdź pełny tekst źródłaBlyth, Andrew. Information Assurance: Security in the Information Environment. Springer London, 2006.
Znajdź pełny tekst źródłaTorp, Jeffrey. Information security: Guidance, standards, and issuances. AlexInformation, 2006.
Znajdź pełny tekst źródłaD, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.
Znajdź pełny tekst źródłaLewis, Ryan F. Information security laws: An introduction. Nova Science Publishers, 2011.
Znajdź pełny tekst źródłaGifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.
Znajdź pełny tekst źródłaGifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.
Znajdź pełny tekst źródłaUnited States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.
Znajdź pełny tekst źródłaUnited States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.
Znajdź pełny tekst źródłaCzęści książek na temat "Information security legislations"
Montasari, Reza, Hamid Jahankhani, and Fiona Carrol. "Combating Human Trafficking: An Analysis of International and Domestic Legislations." In Information Security Technologies for Controlling Pandemics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72120-6_5.
Pełny tekst źródłaCampbell, Tony. "Standards, Frameworks, Guidelines, and Legislation." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.
Pełny tekst źródłaLane, V. P. "Privacy and Data Protection Legislation." In Security of Computer Based Information Systems. Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_9.
Pełny tekst źródłaMehta, Nisarg, Priyansh Sanghavi, Manish Paliwal, and Madhu Shukla. "A Comprehensive Study on Cyber Legislation in G20 Countries." In Advancements in Smart Computing and Information Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23095-0_1.
Pełny tekst źródłaMeints, Martin. "The Relationship between Data Protection Legislation and Information Security Related Standards." In The Future of Identity in the Information Society. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03315-5_19.
Pełny tekst źródłaVasilenko-Zakharova, Olga V., and Anatoly V. Zubach. "Current State of Criminal Legislation and Law Enforcement Practice on Parole in the Russian Federation and the Republic of Lithuania." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_30.
Pełny tekst źródłaUrmatova, Ainura D., Tamara I. Ganieva, Edil E. Moldoev, Tolkun S. Salybekova, and Kadyrbek A. Umetov. "The Use of Legal Intersectoral Terminology in the Process of Improving Legislation, Legislative Innovations on the Responsibility of Legal Entities in the Conditions of the Sovereignty of Kyrgyzstan." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_37.
Pełny tekst źródłaVolchek, Katerina, Joanne Yu, Barbara Neuhofer, Roman Egger, and Mattia Rainoldi. "Co-creating Personalised Experiences in the Context of the Personalisation-Privacy Paradox." In Information and Communication Technologies in Tourism 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65785-7_8.
Pełny tekst źródłaWhite, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." In Privacy Solutions and Security Frameworks in Information Protection. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch004.
Pełny tekst źródłaMishra, Sushma. "Internal Auditing for Information Assurance." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch024.
Pełny tekst źródłaStreszczenia konferencji na temat "Information security legislations"
Held, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.
Pełny tekst źródłaYanev, Rysi, and Svetlana Nikoloska. "LEGAL AND CRIMINALISTIC FEATURES OF MONEY LAUNDERING IN THE REPUBLIC OF BULGARIA AND THE REPUBLIC OF NORTH MACEDONIA." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.5.21.p07.
Pełny tekst źródłaMateeva, Zhivka. "NATURE OF THE CONTROL OVER THE PROTECTION OF CLASSIFIED INFORMATION, CARRIED OUT BY THE STATE COMMISSION OF INFORMATION SECURITY." In THE LAW AND THE BUSINESS IN THE CONTEMPORARY SOCIETY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/lbcs2020.263.
Pełny tekst źródłaBekara, Kheira, and Maryline Laurent. "A Semantic Information Model Based on the Privacy Legislation." In 2011 Conference on Network and Information Systems Security (SAR-SSI). IEEE, 2011. http://dx.doi.org/10.1109/sar-ssi.2011.5931375.
Pełny tekst źródłaRedford, Mike. "U.S. and EU Legislation on Cybercrime." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.38.
Pełny tekst źródłaGupta, Ms Saumya. "Data Privacy in The Digital Era: Balancing Innovation and Intellectual Property Rights." In Intellectual Property Rights: Issues and Challenges. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/c250615.
Pełny tekst źródłaAndreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.
Pełny tekst źródłaDaniels, Jesse, and Sajal Bhatia. "Legislation and the Negative Impact on Cybersecurity in Healthcare." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009157906910697.
Pełny tekst źródłaGahír, Jakub, and Denis Kontárová. "Systém riadenia informačnej bezpečnosti (ISMS) a návrh jeho implementácie u prevádzkovateľa letiska." In Práce a štúdie. University of Žilina, 2024. http://dx.doi.org/10.26552/pas.z.2024.2.5.
Pełny tekst źródłaKoroied, S. O. "ENSURING INFORMATION SECURITY OF PARTICIPANTS IN CIVIL CASES RESIDING IN THE TEMPORARY OCCUPIED TERRITORY OF UKRAINE." In LEGAL SCIENCE, LEGISLATION AND LAW ENFORCEMENT: TRADITIONS AND NEW EUROPEAN APPROACHES. Izdevnieciba “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-324-8-7.
Pełny tekst źródłaRaporty organizacyjne na temat "Information security legislations"
Pretorius, Christo. EU Employment Law and the AI Act: A Policy Brief Putting the Human Back in ‘Human-Centric’ Policy. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0002.
Pełny tekst źródłaLEONOV, T. M., V. M. BOLSHAKOVA, and P. YU NAUMOV. THEORETICAL AND LEGAL ASPECTS OF PROVIDING MEDICAL ASSISTANCE TO EMPLOYEES OF THE MILITARY PROSECUTOR’S OFFICE. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2576-9634-2021-5-4-12.
Pełny tekst źródłaSandford, Robert, Kaveh Madani, Emily Lorra Hines, et al. The Future of Freshwater in Canada. Massey College and the United Nations University Institute for Water, 2023. https://doi.org/10.53328/inr23rs01.
Pełny tekst źródła