To see the other types of publications on this topic, follow the link: Breaches.

Books on the topic 'Breaches'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Breaches.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Daswani, Neil, and Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

S, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Foster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Personal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Van Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Great Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Russell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ombudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Belling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bridging Love's Breaches. iUniverse, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Davidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Davidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Fowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Centre, National Computing, ed. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Elbayadi, Moudy, and Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Flanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ho, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ho, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ho, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Committee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Publishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Moore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Scholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Danae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.

Full text
Abstract:
Chapter 5 addresses unilateral treaty law responses available to treaty parties against breaches of transit obligations therein, and examines whether the exceptio non adimpleti contractus has a separate existence to the rule concerning responses to material breaches under the law of treaties. It illustrates that there may be special rules in treaties that displace treaty law responses under customary international law. The analysis distinguishes treaty law responses (and the exceptio non adimpleti contractus) from countermeasures. It demonstrates that even though unilateral responses under the law of treaties may be available to treaty parties other than the defaulting transit treaty party in response to a material breach of the treaty establishing transit of energy obligations (or non-performance may as a matter of treaty interpretation be allowed by virtue of the exceptio), these do not overlap and do not exclude countermeasures under the law of international responsibility.
APA, Harvard, Vancouver, ISO, and other styles
35

Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ricento, Thomas, Yael Peled, and Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Data Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Committee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ricento, Thomas, Yael Peled, and Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Information Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Walker, John, and Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Library, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Data Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Jeyanthi, N., and R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Combating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography