Books on the topic 'Data access control policies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data access control policies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Amatayakul, Margaret K. The no-hassle guide to EHR policies. Marblehead, MA: HCPro, 2006.
Find full textWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 8. Sausalito, Calif: InfoSecurity Infrastructure, 2001.
Find full textWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 5. Sausalito, Ca: Baseline Software, 1996.
Find full textWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 7. Sausalito, Calif: Baseline Software, 1999.
Find full textHsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textMiyashita, Hiroshi. Kojin jōhō hogo no shisaku: Policies on the protection of personal information : kajō hannō no kaishō ni mukete. Tōkyō: Chōyōkai, 2010.
Find full textNeale, Hooper, ed. Open access policies, practices and licensing: A review of the literature in Australia and selected jurisdictions. Brisbane: Queensland University of Technology, 2009.
Find full textJustitiedepartementet, Sweden. Två frågor om sekretess hos Säkerhetspolisen. Stockholm]: Regeringskansliet, Justitiedepartementet, 2001.
Find full textP. J. D. J. Muijen. Handleiding politie & privacy: De betekenis van de Wet Persoonsregistraties en de Wet Politieregisters voor de politiepraktijk. Lochem: Van den Brink, 1991.
Find full textBelair, Robert R. Criminal justice information policy: Data quality of criminal history records. Washington, D.C: U.S. Dept. of Justice, Bureau of Justice Statistics, 1985.
Find full textKoelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.
Find full textKoelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.
Find full textCarnahan Conference on Security Technology (1987 Atlanta, Ga.). Proceedings: 1987 Carnahan Conference on Security Technology : Electronic crime countermeasures, July 15-17, 1987. Edited by Jackson John S, De Vore R. William, and Institute of Electrical and Electronics Engineers. Lexington Section. [Lexington, KY]: Office of Engineering Services, University of Kentucky, 1987.
Find full textFerrari, Elena. Access Control in Data Management Systems. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.
Full textAccess control in data management systems. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2010.
Find full textZhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Find full textde, Guchteneire Paul, Mochmann Ekkehard, Sociall- Wetenschappelijk Informatie- en Documentatiecentrum (Koninklijke Nederlandse Akademie van Wetenschappen), and International Federation of Data Organizations for the Social Sciences., eds. Data protection and data access: Reports from ten countries on data protection and data access in social research, with an annotated international bibliography. Amsterdam, Netherlands: SWIDOC/IFDO, 1990.
Find full textSarli, Cathy, Ellen Dubinsky, and Bob Engeszer. Public access policies. Washington, D.C: Association of Research Libraries, 2009.
Find full textKoelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.
Find full textRemote access essentials. Boston: AP Professional, 1996.
Find full textde, Guchteneire Paul, Mochman Ekkehard, Sociaal-Wetebschappelijk Informatieen Documentatiecentrum van de Koninklijke Akademie van Wetenschappen., and International Federation of Data Organizations for the Social Sciences., eds. Data protection and access: Reports from ten countries on data protection and data access in social research, with an annotated international bibliography. Amsterdam: North-Holland, 1990.
Find full textBritain, Great. Data protection: The Access to Health Records (Control of Access) Regulations 1993. London: HMSO, 1993.
Find full textBaker, Dixie B. Assessing controlled access protection. [Ft. George G. Meade, MD] (9800 Savage Rd., Ft. George G. Meade 20755-6000): National Computer Security Center, 1992.
Find full textRichard, Browning, ed. Global monitoring: The challenges of access to data. London: UCL Press, 2005.
Find full textNational Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Find full textInc, Regulatory Compliance Associates, ed. Protecting customer privacy: Management process from policies to quality control checklists. Austin, Tex: Sheshunoff Information Services, 2000.
Find full textFreddy, Kosten, ed. Managing data protection. 2nd ed. Oxford: Butterworth-Heinemann, 1994.
Find full textIFIP TC 11/WG 11.3 Conference on Data and Applications Security (18th 2004 Sitges, Spain). Research directions in data and applications security XVIII: IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. Boston: Kluwer Academic Publishers, 2004.
Find full textCsilla, Farkas, and Samarati Pierangela, eds. Research directions in data and applications security XVIII: IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. Boston: Kluwer Academic Publishers, 2004.
Find full textJasper, Kim. User access & information protection: Managing open access & information protection. Hamburg [Germany]: PROJECT CONSULT, 2002.
Find full textIntroduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.
Find full textInformation protection and other unnatural acts: Every manager's guide to keeping vital computer data safe and sound. New York, NY: Amacom, 1992.
Find full textWare, Willis H. Perspectives on trusted computer systems. Santa Monica, CA: Rand, 1988.
Find full textP. C. M. van der Enden. Privacy: Een kwaliteitsaspect van informatie-systemen. Alphen aan den Rijn: Samsom, 1988.
Find full textMicrocomputer data security: Issues and strategies. New York, NY: Prentice Hall Press, 1986.
Find full textM, Pounder C. N., and Chartered Institute of Public Finance and Accountancy., eds. Managing data protection. London: CIPFA, 1987.
Find full textMogollon, Manuel. Cryptography and security services: Mechanisms and applications. Hershey, PA: CyberTech Pub., 2007.
Find full textJordan, Carole S. A Guide to understanding discretionary access control in trusted systems. [Fort George G. Meade, MD]: National Computer Security Center, 1987.
Find full textHeld, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Find full textKathy, Kelso, Canadian Legal Information Centre, and Alamar Education Incorporated, eds. Electronic legal information: Exploring access issues. [Ottawa]: The Centre, 1991.
Find full textR, Lowe Michael, Servais Cheryl E, and American Health Information Management Association, eds. The legal health record: Regulations, policies, and guidelines. 2nd ed. Chicago, Ill: American Health Information Management Association, 2011.
Find full textMargaret, Jackson. Hughes on data protection in Australia. 2nd ed. Sydney: Lawbook Co., 2001.
Find full textPierce, Clayton C. Classical ciphers. [Ventura, CA]: C.C. Pierce, 1999.
Find full textCryptoPrivacy. Ventura, CA: C.C. Pierce, 1989.
Find full textExploring electronic health records. [Place of publication not identified]: Paradigm Publishing, Inc, 2014.
Find full textSchaum's outlines medical charting. Chicago: McGraw-Hill, 2012.
Find full textSeipel, Peter. ADB-upptagningars offentlighet: Rapport till Data- och offentlighetskommittén. Stockholm: Institutet för rättsinformatik, Stockholms universitet, 1988.
Find full textVictoria. Office of the Victorian Privacy Commissioner. Mr C's case: Report of an investigation pursuant to Part 6 of the Information Privacy Act 2000 into Victoria Police and Department of Justice in relation to the security of personal information in the Law Enforcement Assistance Program (LEAP) and E* Justice databases. Melbourne: Office of the Victorian Privacy Commissioner, 2006.
Find full textPenney, Jonathon W. Open connectivity, open data: Two dimensions of the freedom to seek, receive and impart information. Wellington, N.Z.]: Victoria University of Wellington, 2012.
Find full text