To see the other types of publications on this topic, follow the link: Data access control policies.

Books on the topic 'Data access control policies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data access control policies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Amatayakul, Margaret K. The no-hassle guide to EHR policies. Marblehead, MA: HCPro, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 8. Sausalito, Calif: InfoSecurity Infrastructure, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 5. Sausalito, Ca: Baseline Software, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 7. Sausalito, Calif: Baseline Software, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miyashita, Hiroshi. Kojin jōhō hogo no shisaku: Policies on the protection of personal information : kajō hannō no kaishō ni mukete. Tōkyō: Chōyōkai, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neale, Hooper, ed. Open access policies, practices and licensing: A review of the literature in Australia and selected jurisdictions. Brisbane: Queensland University of Technology, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Justitiedepartementet, Sweden. Två frågor om sekretess hos Säkerhetspolisen. Stockholm]: Regeringskansliet, Justitiedepartementet, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

P. J. D. J. Muijen. Handleiding politie & privacy: De betekenis van de Wet Persoonsregistraties en de Wet Politieregisters voor de politiepraktijk. Lochem: Van den Brink, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Belair, Robert R. Criminal justice information policy: Data quality of criminal history records. Washington, D.C: U.S. Dept. of Justice, Bureau of Justice Statistics, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Koelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Koelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Carnahan Conference on Security Technology (1987 Atlanta, Ga.). Proceedings: 1987 Carnahan Conference on Security Technology : Electronic crime countermeasures, July 15-17, 1987. Edited by Jackson John S, De Vore R. William, and Institute of Electrical and Electronics Engineers. Lexington Section. [Lexington, KY]: Office of Engineering Services, University of Kentucky, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ferrari, Elena. Access Control in Data Management Systems. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Access control in data management systems. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

de, Guchteneire Paul, Mochmann Ekkehard, Sociall- Wetenschappelijk Informatie- en Documentatiecentrum (Koninklijke Nederlandse Akademie van Wetenschappen), and International Federation of Data Organizations for the Social Sciences., eds. Data protection and data access: Reports from ten countries on data protection and data access in social research, with an annotated international bibliography. Amsterdam, Netherlands: SWIDOC/IFDO, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sarli, Cathy, Ellen Dubinsky, and Bob Engeszer. Public access policies. Washington, D.C: Association of Research Libraries, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Koelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Remote access essentials. Boston: AP Professional, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

de, Guchteneire Paul, Mochman Ekkehard, Sociaal-Wetebschappelijk Informatieen Documentatiecentrum van de Koninklijke Akademie van Wetenschappen., and International Federation of Data Organizations for the Social Sciences., eds. Data protection and access: Reports from ten countries on data protection and data access in social research, with an annotated international bibliography. Amsterdam: North-Holland, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Britain, Great. Data protection: The Access to Health Records (Control of Access) Regulations 1993. London: HMSO, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Baker, Dixie B. Assessing controlled access protection. [Ft. George G. Meade, MD] (9800 Savage Rd., Ft. George G. Meade 20755-6000): National Computer Security Center, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Richard, Browning, ed. Global monitoring: The challenges of access to data. London: UCL Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Biham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Inc, Regulatory Compliance Associates, ed. Protecting customer privacy: Management process from policies to quality control checklists. Austin, Tex: Sheshunoff Information Services, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Freddy, Kosten, ed. Managing data protection. 2nd ed. Oxford: Butterworth-Heinemann, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

IFIP TC 11/WG 11.3 Conference on Data and Applications Security (18th 2004 Sitges, Spain). Research directions in data and applications security XVIII: IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. Boston: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Csilla, Farkas, and Samarati Pierangela, eds. Research directions in data and applications security XVIII: IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. Boston: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jasper, Kim. User access & information protection: Managing open access & information protection. Hamburg [Germany]: PROJECT CONSULT, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Introduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Information protection and other unnatural acts: Every manager's guide to keeping vital computer data safe and sound. New York, NY: Amacom, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ware, Willis H. Perspectives on trusted computer systems. Santa Monica, CA: Rand, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

P. C. M. van der Enden. Privacy: Een kwaliteitsaspect van informatie-systemen. Alphen aan den Rijn: Samsom, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Microcomputer data security: Issues and strategies. New York, NY: Prentice Hall Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

M, Pounder C. N., and Chartered Institute of Public Finance and Accountancy., eds. Managing data protection. London: CIPFA, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mogollon, Manuel. Cryptography and security services: Mechanisms and applications. Hershey, PA: CyberTech Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jordan, Carole S. A Guide to understanding discretionary access control in trusted systems. [Fort George G. Meade, MD]: National Computer Security Center, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kathy, Kelso, Canadian Legal Information Centre, and Alamar Education Incorporated, eds. Electronic legal information: Exploring access issues. [Ottawa]: The Centre, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

R, Lowe Michael, Servais Cheryl E, and American Health Information Management Association, eds. The legal health record: Regulations, policies, and guidelines. 2nd ed. Chicago, Ill: American Health Information Management Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Margaret, Jackson. Hughes on data protection in Australia. 2nd ed. Sydney: Lawbook Co., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pierce, Clayton C. Classical ciphers. [Ventura, CA]: C.C. Pierce, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

CryptoPrivacy. Ventura, CA: C.C. Pierce, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Exploring electronic health records. [Place of publication not identified]: Paradigm Publishing, Inc, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Schaum's outlines medical charting. Chicago: McGraw-Hill, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Seipel, Peter. ADB-upptagningars offentlighet: Rapport till Data- och offentlighetskommittén. Stockholm: Institutet för rättsinformatik, Stockholms universitet, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Victoria. Office of the Victorian Privacy Commissioner. Mr C's case: Report of an investigation pursuant to Part 6 of the Information Privacy Act 2000 into Victoria Police and Department of Justice in relation to the security of personal information in the Law Enforcement Assistance Program (LEAP) and E* Justice databases. Melbourne: Office of the Victorian Privacy Commissioner, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Penney, Jonathon W. Open connectivity, open data: Two dimensions of the freedom to seek, receive and impart information. Wellington, N.Z.]: Victoria University of Wellington, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography