Bücher zum Thema „Biometric information protection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Biometric information protection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Den vollen Inhalt der Quelle findenMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Der volle Inhalt der QuelleStefan, Katzenbeisser, und SpringerLink (Online service), Hrsg. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Den vollen Inhalt der Quelle findenTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Den vollen Inhalt der Quelle findencomparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Den vollen Inhalt der Quelle findenDecker, Bart. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle finden1967-, Mathuria Anish, und SpringerLink (Online service), Hrsg. Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Den vollen Inhalt der Quelle findenJakobsson, Markus. Mobile Authentication: Problems and Solutions. New York, NY: Springer New York, 2013.
Den vollen Inhalt der Quelle findenICISC 2007 (2007 Seoul, Korea). Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Berlin: Springer, 2007.
Den vollen Inhalt der Quelle findenEric, Johnson M., und SpringerLink (Online service), Hrsg. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.
Den vollen Inhalt der Quelle findenWeerasinghe, Dasun. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Den vollen Inhalt der Quelle findenFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Border security: Key unresolved issues justify reevaluation of border security surveillance technology program : report to congressional committees. Washington, D.C: U.S. Government Accountability Office, 2006.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Border security: Consular identification cards accepted within United States, but consistent federal guidance needed. Washington, D.C: U.S. General Accountability, 2004.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Border security: Stronger actions needed to assess and mitigate risks of the Visa Waiver Program : report to the chairman, Committee on the Judiciary, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2006.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Opportunities to increase coordination of air and marine assets : report to the Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. [Washington, D.C.]: U.S. Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Actions needed to strengthen management of Department of Homeland Security's Visa Security Program : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Streamlined visas mantis program has lowered burden on foreign science students and scholars, but further refinements needed : report to congressional requesters. Washington, D.C: U.S. Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Long-term strategy needed to keep pace with increasing demand for visas : report to the Committee on Oversight and Government Reform, House of Representatives. Washington, DC: United States Government Accountability Office, 2007.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Fraud risks complicate State's ability to manage Diversity Visa Program : report to the Chairman, Committee on Homeland Security, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Transformation strategy needed to address challenges facing the Federal Protective Service : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2004.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Federal Protective Service could better measure the performance of its control centers : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S Government Accountability Office, 2006.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland Security: Departmentwide integrated financial management systems remain a challenge : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2007.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Homeland Security: Further action needed to promote successful use of special DHS acquisition authority : report to congressional committees. Washington, D.C: GAO, 2004.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Homeland security: Management of first responder grant programs has improved, but challenges remain : report to the Chairman, Committee on Appropriations, House of Representatives. Washington, D.C: GAO, 2005.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Homeland Security: Management challenges remain in transforming immigration programs : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2004.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Homeland security: DHS' efforts to enhance first responders' all-hazards capabilities continue to evolve : report to the chairman and ranking Democratic member, Subcommittee on Economic Development, Public Buildings and Emergency Management, Committee on Transportation and Infrastructure, House of Representation. Washington, D.C: United States Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland Security: Planned expendtiures for U.S. visitor and immigrant status program need to be adequately defined and justified : report to congressional committees. Washington D.C: U.S. Government Accountability Office, 2007.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Opportunities exist to enhance collaboration at 24/7 operations centers staffed by multiple DHS agencies : report to congressional requesters. Washington, D.C: U.S. States Government Accountability Office, 2006.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Agency plans, implementation, and challenges regarding the national strategy for homeland security : report to the chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Federal leadership and intergovernmental cooperation required to achieve first responder interoperable communications : report to Congressional requesters. Washington, D.C: GAO, 2004.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Successes and challenges in DHS's efforts to create an effective acquisition organization : report to congressional committees. Washington, D.C: U.S. Govt. Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Process for reporting lessons learned from seaport exercises needs further attention : report to Congressional requesters. Washington, D.C: Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program : report to Congressional committees. Washington, D.C: Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenBritain, Great. Protection of Freedoms Act 2012 (Destruction, Retention and Use of Biometric Data) (Transitional, Transitory and Saving Provisions) (Amendment) Order 2015. Stationery Office, The, 2015.
Den vollen Inhalt der Quelle findenEthical Implications of the Global Use of Digitised Biomedical and Biometric Data Workshop Proceedings. IOS Press, 2011.
Den vollen Inhalt der Quelle findenShi, Yun Q. Transactions on Data Hiding and Multimedia Security VIII. Springer, 2012.
Den vollen Inhalt der Quelle findenClarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.
Den vollen Inhalt der Quelle findenWeerasinghe, Dasun. Information Security and Digital Forensics. Springer, 2010.
Den vollen Inhalt der Quelle findenJakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer, 2012.
Den vollen Inhalt der Quelle findenInformation Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers. Springer, 2012.
Den vollen Inhalt der Quelle findenCamp, L. Jean, und M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.
Den vollen Inhalt der Quelle findenAvailability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th ... Springer, 2014.
Den vollen Inhalt der Quelle findenInformation Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings. Springer, 2010.
Den vollen Inhalt der Quelle findenClarke, Nathan. Transparent User Authentication. Springer, 2011.
Den vollen Inhalt der Quelle finden