Bücher zum Thema „Breaches“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Breaches" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Daswani, Neil, und Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Der volle Inhalt der QuelleS, Logweller Cary, Hrsg. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Den vollen Inhalt der Quelle findenFoster, Peter C., Sara E. Cable, Kathleen M. Porter und Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Den vollen Inhalt der Quelle findenPersonal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Den vollen Inhalt der Quelle findenArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Den vollen Inhalt der Quelle findenVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Der volle Inhalt der QuelleWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Der volle Inhalt der QuelleRita, Tehan, Hrsg. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Den vollen Inhalt der Quelle findenKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.
Den vollen Inhalt der Quelle findenGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.
Den vollen Inhalt der Quelle findenRussell, Shumway, Hrsg. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.
Den vollen Inhalt der Quelle findenOmbudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.
Den vollen Inhalt der Quelle findenBelling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.
Der volle Inhalt der QuelleBridging Love's Breaches. iUniverse, Inc., 2004.
Den vollen Inhalt der Quelle findenY, Chow Stephen, Anthony Barbara B und Massachusetts Continuing Legal Education, Inc. (1982- ), Hrsg. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Den vollen Inhalt der Quelle findenY, Chow Stephen, Anthony Barbara B und Massachusetts Continuing Legal Education, Inc. (1982- ), Hrsg. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Den vollen Inhalt der Quelle findenDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Den vollen Inhalt der Quelle findenDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Den vollen Inhalt der Quelle findenFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Den vollen Inhalt der Quelle findenData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Den vollen Inhalt der Quelle findenCentre, National Computing, Hrsg. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.
Den vollen Inhalt der Quelle findenElbayadi, Moudy, und Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.
Den vollen Inhalt der Quelle findenFlanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.
Der volle Inhalt der QuelleKelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.
Den vollen Inhalt der Quelle findenHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Den vollen Inhalt der Quelle findenHo, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.
Den vollen Inhalt der Quelle findenHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Den vollen Inhalt der Quelle findenCommittee on Energy and Commerce, United States House of Representatives und United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Den vollen Inhalt der Quelle findenWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Den vollen Inhalt der Quelle findenHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Den vollen Inhalt der Quelle findenPublishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.
Den vollen Inhalt der Quelle findenMoore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.
Den vollen Inhalt der Quelle findenScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Den vollen Inhalt der Quelle findenDanae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.
Der volle Inhalt der QuelleJustice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.
Den vollen Inhalt der Quelle findenRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Den vollen Inhalt der Quelle findenRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Den vollen Inhalt der Quelle findenRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Den vollen Inhalt der Quelle findenRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Den vollen Inhalt der Quelle findenRicento, Thomas, Yael Peled und Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.
Den vollen Inhalt der Quelle findenData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Den vollen Inhalt der Quelle findenRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Den vollen Inhalt der Quelle findenCommittee on Financial Services, United States House of Representatives und United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Den vollen Inhalt der Quelle findenRicento, Thomas, Yael Peled und Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.
Den vollen Inhalt der Quelle findenInformation Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.
Den vollen Inhalt der Quelle findenWalker, John, und Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.
Den vollen Inhalt der Quelle findenLibrary, Harvard College, Hrsg. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.
Den vollen Inhalt der Quelle findenData Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.
Den vollen Inhalt der Quelle findenJeyanthi, N., und R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.
Den vollen Inhalt der Quelle findenCombating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.
Den vollen Inhalt der Quelle finden