Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Sensitive information.

Bücher zum Thema „Sensitive information“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Sensitive information" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Hearing on sensitive but not classified information. [Washington, D.C.]: U.S. National Commission on Libraries and Information Science, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Prime, Terence. Legal protection of commercially sensitive information and trade secrets. Sudbury, Suffolk: Monitor Press Ltd., 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Office, General Accounting. NASA aeronautics: Protecting sensitive technology : report to Congressional requesters. Washington, D.C: U.S. General Accounting Office, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

United States. National Commission on Libraries and Information Science. Hearing on sensitive but not classified information: Library of Congress, Washington, D.C., Thursday, May 28, 1987. [Washington, D.C: U.S.G.P.O., 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

IFIP TC8/WG8.3 International Conference on Context-Sensitive Decision Support Systems (1998 Bled, Slovenia). Context sensitive decision support systems: IFIP TC8 / WG8.3 International Conference on Context-Sensitive Decision Support Systems, 13-15 July 1998, Bled, Slovenia. London: Chapman & Hall, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Integrity, Victoria Office of Police. Report on the leak of a sensitive Victoria Police information report. Melbourne: Govt. Printer, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

World Summit on Information Society Gender Caucus. Towards a gender sensitive information society: The history of World Summit on Information Society Gender Caucus. Johannesburg, South Africa: World Summit on Information Society Gender Caucus, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

United States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

New York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

N, Gibbs John, Lewis Marieke und Library of Congress. Federal Research Division., Hrsg. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Cross-cultural technology design: Crafting culture-sensitive technology for local users. Oxford: Oxford University Press, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Commission, United States Nuclear Regulatory. Security policy for processing and handling of sensitive unclassified information in the AUTOS/Local Area Network environment. [Bethesda, Md.?]: U.S. Nuclear Regulatory Commission, Office of Information Resources Management, Division of Information Support Services, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Office, United States Governemnt Accountability. Transportation Security Administration: Clear policies and oversight needed for designation of sensitive security information : report to Congressional Requesters. Washington, D.C: GAO, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

United States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. [Washington, D.C.]: GAO, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Identity theft: Recent developments involving the security of sensitive consumer information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on recent developments involving the security of sensitive consumer information relating to identity theft, focusing on laws currently applicable to resellers of consumer information, March 10 and 15, 2005. Washington: U.S. G.P.O., 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Office, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Offenders, Canada Federal Ad Hoc Interdepartmental Working Group on Information Systems on Child Sex. Report of the Federal Ad Hoc interdepartmental Working Group on Information Systems on Child Sex Offenders: Screening of volunteers and employees in child-sensitive positions. [Ottawa]: Government of Canada, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Canada. Federal Ad Hoc Interdepartmental Working Group on Information Systems on Child Sex Offenders. Report of the Federal Ad hoc interdepartmental Working Group on Information Systems on Child Sex Offenders: Screening of volunteers and employees in child-sensitive positions. [Ottawa]: The Group, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

United States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Space. NASA security: Assessing the agency's efforts to protect sensitive information : joint hearing before the Subcommittee on Space & Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, June 20, 2014. Washington: U.S. Government Printing Office, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Examining the financial services industry's responsibilities and role in preventing identity theft and protecting sensitive financial information: Hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on examining the financial services industry's responsibilities and role in preventing identity theft and protecting sensitive financial information, September 22, 2005. Washington: U.S. G.P.O., 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Office, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Office, General Accounting. Document security: Justice can improve its controls over classified and sensitive documents : report to the Chairman, Information, Justice, Transportation and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

United States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. Washington: U.S. G.P.O., 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Context sensitive health informatics: Human and sociotechnical approaches. Amsterdam: IOS Press, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Rhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Agencies in peril: Are we doing enough to protect federal IT and secure sensitive information? : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, second session, March 12, 2008. Washington: U.S. G.P.O., 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Do cellular and other wireless devices interfere with sensitive medical equipment?: Hearing before the Information, Justice, Transportation, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, October 5, 1994. Washington: U.S. G.P.O., 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

How secure is sensitive Commerce Department data and operations?: A review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001. Washington: U.S. G.P.O., 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

KEITH, Josh. Sensitive Compartmentalized Information : (born Classified). Independently Published, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Underhill, William. Managing The Dissemination Of Price Sensitive Information. Gower Pub Co, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Widmeyer, George, und Vladislav Rajkovic. Context-Sensitive Decision Support Systems. Springer, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Exchange, International Stock, Hrsg. Guidance on the dissemination of price sensitive information. London: International Stock Exchange, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Guidance for Transportation Agencies on Managing Sensitive Information. Washington, D.C.: Transportation Research Board, 2005. http://dx.doi.org/10.17226/23417.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Center for National Threat Assessment Inc. Staff und American Board for Certification in Homeland Security Staff. Guide to the Sensitive Security Information Body of Knowledge. Taylor & Francis Group, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

American Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Sensitive Security Information, Certified® (SSI) Body of Knowledge. CRC Press, 2016. http://dx.doi.org/10.1201/b19524.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Committee on Financial Services, United States House of Representatives und United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

American Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

American Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

American Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Insider trading: Coping with the use & abuse of market sensitive information. New York: Law & Business/Harcourt Brace Jovanovich, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Committee on Banking Housing (senate), United States Senate und United States United States Congress. Identity Theft: Recent Developments Involving the Security of Sensitive Consumer Information. Independently Published, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Insider Trading: Coping With the Use and Abuse of Market Sensitive Information. Aspen Law & Business, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

The Nebraska Health Information Project, 1996: Ambulatory care sensitive conditions, 1994-1995. [Lincoln]: The Dept., 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Schnell, Rainer, Peter Christen und Thilina Ranbaduge. Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing. Springer International Publishing AG, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Schnell, Rainer, Peter Christen und Thilina Ranbaduge. Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing. Springer International Publishing AG, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Prime, Terry. Legal Protection of Commercially Sensitive Information and Trade Secrets (Monitor Press Special Report). Monitor Press, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Davis, Paul, Walter Perry, John Hollywood und David Manheim. Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence. RAND Corporation, 2016. http://dx.doi.org/10.7249/rr1200.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Walter. Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence. Ran, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Aboh, Enoch. Information Structure. Herausgegeben von Caroline Féry und Shinichiro Ishihara. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199642670.013.004.

Der volle Inhalt der Quelle
Annotation:
This chapter discusses the cartographic approach to clause structure according to which information structure directly relates to syntactic heads that project within the clausal left periphery. This view is supported by data from languages in which information-structure-sensitive notions (e.g. topic, focus) are encoded by means of discourse markers that trigger various constituent displacement rules. Such empirical facts are compatible with the cartographic view in which lexical choices condition information packaging and clause structure. Put together, the cross-linguistic data presented in this chapter indicate that [FOCUS], [TOPIC], and [INTERROGATIVE] represent formal features that are properties of lexical elements and may sometimes trigger generalized-piping and snowballing movement.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie