Books on the topic 'Breaches'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Breaches.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Daswani, Neil, and Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Full textS, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Find full textFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Find full textPersonal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Find full textArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Find full textVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Full textWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Full textRita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Find full textKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.
Find full textGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.
Find full textRussell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.
Find full textOmbudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.
Find full textBelling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.
Full textBridging Love's Breaches. iUniverse, Inc., 2004.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Find full textDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Find full textDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Find full textFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Find full textData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Find full textCentre, National Computing, ed. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.
Find full textElbayadi, Moudy, and Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.
Find full textFlanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.
Full textKelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.
Find full textHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Find full textHo, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.
Find full textHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Find full textCommittee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Find full textWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Find full textHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Find full textPublishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.
Find full textMoore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.
Find full textScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Find full textDanae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.
Full textJustice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.
Find full textRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Find full textRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Find full textRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Find full textRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Find full textRicento, Thomas, Yael Peled, and Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.
Find full textData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Find full textRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Find full textCommittee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Find full textRicento, Thomas, Yael Peled, and Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.
Find full textInformation Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.
Find full textWalker, John, and Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.
Find full textLibrary, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.
Find full textData Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.
Find full textJeyanthi, N., and R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.
Find full textCombating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.
Find full text