Bücher zum Thema „Sensitive date“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Sensitive date" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Den vollen Inhalt der Quelle findenChristen, Peter, Thilina Ranbaduge und Rainer Schnell. Linking Sensitive Data. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.
Der volle Inhalt der QuellePhotopoulos, Constantine. Managing catastrophic loss of sensitive data. Burlington, MA: Syngress Pub., 2008.
Den vollen Inhalt der Quelle findenClaire, Levallois-Barth, Hrsg. Sensitive data protection in the European Union. Bruxelles: Bruylant, 2007.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.
Den vollen Inhalt der Quelle findenGreat Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. London: Stationery Office, 2002.
Den vollen Inhalt der Quelle findenDaniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2. Aufl. Atlanta, Ga: Georgia State Univ. Business Press, 1993.
Den vollen Inhalt der Quelle findenComputer Security Analysts (Firm : Alexandria, Va.), Hrsg. A Methodology for certifying sensitive computer applications within federal agencies. Alexandria, Va. (PO Box 10255, Alexandria 22310): Computer Security Analysts, 1986.
Den vollen Inhalt der Quelle findenE, Tracy Paul, Hrsg. Randomized response: A method for sensitive surveys. Beverly Hills: Sage Publications, 1986.
Den vollen Inhalt der Quelle findenStaszkiewicz, Maddison. Using Online Surveys to Capture Time-Sensitive Data in a Low-Resource Setting. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529601831.
Der volle Inhalt der QuelleN, Gibbs John, Lewis Marieke, Library of Congress. Federal Research Division und United States. National Aeronautics and Space Administration. Office of Inspector General, Hrsg. Laws governing the protection of sensitive but unclassified information: A report. Washington, D.C: Federal Research Division, Library of Congress, 2004.
Den vollen Inhalt der Quelle findenMewes, Hans-Werner. Schnelle Identifizierung von Peptiden durch sensitive Bestimmung ihrer Aminosäurezusammensetzung und Zugriff auf Sequenzdatenbanken. Gauting bei München: Intemann, 1989.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.
Den vollen Inhalt der Quelle findenvan der Sloot, Bart, und Sascha van Schendel. The Boundaries of Data. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.
Der volle Inhalt der QuelleOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Den vollen Inhalt der Quelle findenNew York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.
Den vollen Inhalt der Quelle findenN, Gibbs John, Lewis Marieke und Library of Congress. Federal Research Division., Hrsg. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.
Den vollen Inhalt der Quelle findenRees, Elaine. Threatened, endangered & sensitive species affected by livestock production: A preliminary survey of data available in the western states. Portland, Or: Audubon Society of Portland, 1993.
Den vollen Inhalt der Quelle findenAlan, Cooper. The Mourne Environmentally Sensitive Area land use data base: Report to the Department of Agriculture for Northern Ireland. [Coleraine]: [Department of Environmental Studies, University of Ulster], 1988.
Den vollen Inhalt der Quelle findenParagi, Beata. Challenges in Using Online Surveys for Research Involving Delicate/Sensitive Topics: Data Protection Practices of European NGOs Operating in the Global South. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529604146.
Der volle Inhalt der QuelleUnited States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. Washington: U.S. G.P.O., 2005.
Den vollen Inhalt der Quelle findenKlausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.
Den vollen Inhalt der Quelle findenKlausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. [Washington, D.C.]: GAO, 2006.
Den vollen Inhalt der Quelle findenManaging Catastrophic Loss of Sensitive Data. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-239-3.x0001-6.
Der volle Inhalt der QuelleMcNamara, Kathryn. Defense Data Network: usage sensitive billing. 1986.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.
Den vollen Inhalt der Quelle findenNeumann, Caryn E. Sexual Crime. ABC-CLIO, LLC, 2009. http://dx.doi.org/10.5040/9798216013532.
Der volle Inhalt der QuelleFox, James A. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Den vollen Inhalt der Quelle findenFox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Den vollen Inhalt der Quelle findenFox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Den vollen Inhalt der Quelle findenBritain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, The, 2002.
Den vollen Inhalt der Quelle findenStelzmann, Daniela, und Josephine Ischebeck, Hrsg. Child Sexual Abuse and the Media. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748904403.
Der volle Inhalt der QuelleBritain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) (Amendment) Order 2010. Stationery Office, The, 2010.
Den vollen Inhalt der Quelle findenBunner, James. Password Book: Sensitive Data in One Place / 110 Pages /. Independently Published, 2020.
Den vollen Inhalt der Quelle findenCommittee on Financial Services, United States House of Representatives und United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Den vollen Inhalt der Quelle findenDaniel, Wayne W. Collecting Sensitive Data by Randomized Response: An Annotated Bibliography. 2. Aufl. Georgia State Univ Pr, 1992.
Den vollen Inhalt der Quelle findenRouting of Time-Sensitive Data in Mobile and HOC Networks. Storming Media, 2001.
Den vollen Inhalt der Quelle findenDoing research on sensitive topics. London: Sage Publications, 1993.
Den vollen Inhalt der Quelle findenSurvey methodology: An innovative technique for estimating sensitive survey items. Washington, D.C: The Office, 1999.
Den vollen Inhalt der Quelle findenData acquisition system for linear position sensitive detector based neutron diffractometer. Mumbai: Bhabha Atomic Research Centre, 2003.
Den vollen Inhalt der Quelle findenGiugni, Marco, und Maria Grasso, Hrsg. The Oxford Handbook of Political Participation. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780198861126.001.0001.
Der volle Inhalt der QuellePhotopoulos, Constantine. Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals. Elsevier Science & Technology Books, 2011.
Den vollen Inhalt der Quelle finden