Bücher zum Thema „Biometric information protection“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Biometric information protection.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Biometric information protection" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Maksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Der volle Inhalt der Quelle
Annotation:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian) and international levels. A technological approach has been applied to the consideration of security issues in the global information space, within the framework of which the organizational, technical and legal principles of ensuring information security in cyberspace, as well as ways and means of ensuring security in the global information space have been studied. It is given not only an assessment of the level of use of funds, their interrelation and mutual complement, but also the legal characteristics of security tools in the global information space, for example cryptographic. The resources allocated for the implementation of the type of legal technology under study that were not previously allocated in the legal literature, for example, scientific and economic. The features of the protection of personal information on the Internet are considered, as well as modern problems of legal security in the global information environment, including cybersecurity in banking, healthcare, and biometric data security. The problems of international cooperation in the field of information security are highlighted. For a wide range of readers interested in information security issues. It can be useful for students, postgraduates and teachers of law schools and faculties.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Stefan, Katzenbeisser, und SpringerLink (Online service), Hrsg. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Office, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Transparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

comparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

United States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

United States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

United States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Decker, Bart. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

1967-, Mathuria Anish, und SpringerLink (Online service), Hrsg. Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Jakobsson, Markus. Mobile Authentication: Problems and Solutions. New York, NY: Springer New York, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

ICISC 2007 (2007 Seoul, Korea). Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Berlin: Springer, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Eric, Johnson M., und SpringerLink (Online service), Hrsg. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Weerasinghe, Dasun. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Fischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Office, United States Government Accountability. Border security: Key unresolved issues justify reevaluation of border security surveillance technology program : report to congressional committees. Washington, D.C: U.S. Government Accountability Office, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Office, United States Government Accountability. Border security: Consular identification cards accepted within United States, but consistent federal guidance needed. Washington, D.C: U.S. General Accountability, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Office, United States Government Accountability. Border security: Stronger actions needed to assess and mitigate risks of the Visa Waiver Program : report to the chairman, Committee on the Judiciary, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

United States. Government Accountability Office. Border security: Opportunities to increase coordination of air and marine assets : report to the Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. [Washington, D.C.]: U.S. Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

United States. Government Accountability Office. Border security: Actions needed to strengthen management of Department of Homeland Security's Visa Security Program : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

United States. Government Accountability Office. Border security: Streamlined visas mantis program has lowered burden on foreign science students and scholars, but further refinements needed : report to congressional requesters. Washington, D.C: U.S. Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

United States. Government Accountability Office. Border security: Long-term strategy needed to keep pace with increasing demand for visas : report to the Committee on Oversight and Government Reform, House of Representatives. Washington, DC: United States Government Accountability Office, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

United States. Government Accountability Office. Border security: Fraud risks complicate State's ability to manage Diversity Visa Program : report to the Chairman, Committee on Homeland Security, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

United States. Government Accountability Office. Homeland security: Transformation strategy needed to address challenges facing the Federal Protective Service : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

United States. Government Accountability Office. Homeland security: Federal Protective Service could better measure the performance of its control centers : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S Government Accountability Office, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

United States. Government Accountability Office. Homeland Security: Departmentwide integrated financial management systems remain a challenge : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Office, United States Government Accountability. Homeland Security: Further action needed to promote successful use of special DHS acquisition authority : report to congressional committees. Washington, D.C: GAO, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Office, United States Government Accountability. Homeland security: Management of first responder grant programs has improved, but challenges remain : report to the Chairman, Committee on Appropriations, House of Representatives. Washington, D.C: GAO, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Office, United States Government Accountability. Homeland Security: Management challenges remain in transforming immigration programs : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Office, United States Government Accountability. Homeland security: DHS' efforts to enhance first responders' all-hazards capabilities continue to evolve : report to the chairman and ranking Democratic member, Subcommittee on Economic Development, Public Buildings and Emergency Management, Committee on Transportation and Infrastructure, House of Representation. Washington, D.C: United States Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Office, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

United States. Government Accountability Office. Homeland Security: Planned expendtiures for U.S. visitor and immigrant status program need to be adequately defined and justified : report to congressional committees. Washington D.C: U.S. Government Accountability Office, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

United States. Government Accountability Office. Homeland security: Opportunities exist to enhance collaboration at 24/7 operations centers staffed by multiple DHS agencies : report to congressional requesters. Washington, D.C: U.S. States Government Accountability Office, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

United States. Government Accountability Office. Homeland security: Agency plans, implementation, and challenges regarding the national strategy for homeland security : report to the chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

United States. Government Accountability Office. Homeland security: Federal leadership and intergovernmental cooperation required to achieve first responder interoperable communications : report to Congressional requesters. Washington, D.C: GAO, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

United States. Government Accountability Office. Homeland security: Successes and challenges in DHS's efforts to create an effective acquisition organization : report to congressional committees. Washington, D.C: U.S. Govt. Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

United States. Government Accountability Office. Homeland security: Process for reporting lessons learned from seaport exercises needs further attention : report to Congressional requesters. Washington, D.C: Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

United States. Government Accountability Office. Homeland security: Some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program : report to Congressional committees. Washington, D.C: Government Accountability Office, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Britain, Great. Protection of Freedoms Act 2012 (Destruction, Retention and Use of Biometric Data) (Transitional, Transitory and Saving Provisions) (Amendment) Order 2015. Stationery Office, The, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Ethical Implications of the Global Use of Digitised Biomedical and Biometric Data Workshop Proceedings. IOS Press, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Shi, Yun Q. Transactions on Data Hiding and Multimedia Security VIII. Springer, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Clarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Weerasinghe, Dasun. Information Security and Digital Forensics. Springer, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Jakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers. Springer, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Camp, L. Jean, und M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th ... Springer, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings. Springer, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Clarke, Nathan. Transparent User Authentication. Springer, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie