Books on the topic 'Data Privacy and Security Policies'

To see the other types of publications on this topic, follow the link: Data Privacy and Security Policies.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data Privacy and Security Policies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Inc, Aspatore. Recent trends in privacy and data security: Leading lawyers on analyzing information storage regulations and developing effective data protection policies. Boston, Mass.]: Aspatore, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Riegel, Reinhard. Datenschutz bei den Sicherheitsbehörden: Mit einem Anhang der wichtigsten Fachbegriffe in deutscher, englischer, italienischer und spanischer Sprache. 2nd ed. Köln: Heymann, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sloot, Bart, Dennis Broeders, and Erik Schrijvers. Exploring the Boundaries of Big Data. NL Amsterdam: Amsterdam University Press, 2016. http://dx.doi.org/10.5117/9789462983588.

Full text
Abstract:
Though the exact nature and delineation of Big Data is still unclear, it seems likely that Big Data will have an enormous impact on our daily lives. Exploring the Bounderies of Big Data serves as preparatory work for The Netherlands Scientific Council for Government Policy's advice to the Dutch government, which has asked the Council to address questions regarding Big Data, security and privacy. It is divided into five parts, each part engaging with a different perspective on Big Data: the technical, empirical, legal, regulatory and international perspective.
APA, Harvard, Vancouver, ISO, and other styles
4

Salomon, David. Data Privacy and Security. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, Udai Pratap, Sankita J. Patel, Pethuru Raj, and Andrea Visconti, eds. Security, Privacy and Data Analytics. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9089-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Institute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vaidya, Jaideep. Privacy preserving data mining. New York: Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management, and Security Assurance. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29883-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Livraga, Giovanni, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management and Security Assurance. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Privacy and data security law deskbook. [Frederick, MD]: Aspen Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

E, Ludloff Mary, ed. Privacy and big data. Sebastopol, CA: O'Reilly Media, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Garcia-Alfaro, Joaquin, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wugmeister, Miriam, and Christine E. Lyon. Global employee privacy and data security law. Edited by Morrison & Foerster. 2nd ed. Arlington, VA: BNA Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Das, Pradip Kumar, Hrudaya Kumar Tripathy, and Shafiz Affendi Mohd Yusof, eds. Privacy and Security Issues in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1007-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Barker, Ken, and Kambiz Ghazinour, eds. Data and Applications Security and Privacy XXXV. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sural, Shamik, and Haibing Lu, eds. Data and Applications Security and Privacy XXXVI. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10684-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Foley, Simon N., ed. Data and Applications Security and Privacy XXXIII. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Samarati, Pierangela, ed. Data and Applications Security and Privacy XXIX. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ranise, Silvio, and Vipin Swarup, eds. Data and Applications Security and Privacy XXX. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41483-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Garcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Ana Cavalli, and Jean Leneutre, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19348-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Yingjiu, ed. Data and Applications Security and Privacy XXV. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22348-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cuppens-Boulahia, Nora, Frédéric Cuppens, and Joaquin Garcia-Alfaro, eds. Data and Applications Security and Privacy XXVI. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31540-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Lingyu, and Basit Shafiq, eds. Data and Applications Security and Privacy XXVII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39256-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Foresti, Sara, and Sushil Jajodia, eds. Data and Applications Security and Privacy XXIV. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13739-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kerschbaum, Florian, and Stefano Paraboschi, eds. Data and Applications Security and Privacy XXXII. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95729-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Atluri, Vijay, and Günther Pernul, eds. Data and Applications Security and Privacy XXVIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Singhal, Anoop, and Jaideep Vaidya, eds. Data and Applications Security and Privacy XXXIV. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49669-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Livraga, Giovanni, and Sencun Zhu, eds. Data and Applications Security and Privacy XXXI. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61176-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Di Pietro, Roberto, Javier Herranz, Ernesto Damiani, and Radu State, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35890-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Garcia-Alfaro, Joaquin, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, and William M. Fitzgerald, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Garcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, and Yves Roudier, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11207-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Garcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, and Sabrina de Capitani di Vimercati, eds. Data Privacy Management and Autonomous Spontaneus Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28879-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Klosek, Jacqueline. Data privacy in the information age. Westport, Conn: Quorum Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

R, Wayleith Paulus, ed. Data security: Laws and safeguards. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

International Association of Privacy Professionals, ed. U.S. government privacy: Essential policies and practices for privacy professionals. Portsmouth, NH: International Association of Privacy Professionals (IAPP), 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Altshuler, Yaniv. Security and Privacy in Social Networks. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

The computer privacy handbook. Berkeley, CA: Peachpit Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kierkegaard, Sylvia Mercado. Cyberlaw, security and privacy. Ankara, Turkey: Ankara Bar Association Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Dey, Nilanjan, Vijender Kumar Solanki, and Sharvari Tamane. Privacy and Security Policies in Big Data. IGI Global, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Navigating consumer data protection developments: Understanding current laws and recent breaches to enhance data security policies and practices. United States]: Aspatore, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ramonyai, Jerry. Data and Information Technology: Jquery Mobile, Financial Services, Privacy Policies, Security Testing, Software Troubleshooting,TR5 Argo, Continuous Integration and Continuous Delivery . Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Shah, Rajiv, and Brendan Mcquade. Surveillance, Security, and Intelligence-Led Policing in Chicago. Edited by Larry Bennett, Roberta Garner, and Euan Hague. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040597.003.0012.

Full text
Abstract:
This chapter summarizes the Chicago Police Department’s adoption of Intelligence-Led Policing (ILP) since the early-2000s as a crime prevention and deterrence strategy. It reviews the use of technology such as police observation devices (cameras), the centralization of the Police Department’s data operations at the Crime Prevention and Information Center, a sophisticated data analytics “fusion center,” and examines changing technologies of surveillance used by the police. The authors discuss the integration of police surveillance with privately-owned and operated camera systems, and explore how systems like facial and license plate recognition software and gunshot prediction technologies are reshaping security and policing in Chicago. The chapter also assesses concerns about privacy and eroded civil rights provoked by the expanding use of ILP techniques and data.
APA, Harvard, Vancouver, ISO, and other styles
44

Data Privacy and Security. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Data Privacy and Security. Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Salomon, David. Data Privacy and Security. Springer London, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

P, Kenny J. J., ed. Data privacy and security. Oxford [Oxfordshire]: Pergamon Infotech, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Salomon, David. Data Privacy and Security. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Privacy vs. Security. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Phillips, Joshua, Mark D. Ryan, and Sophie Stalla-Bourdillon. Privacy vs. Security. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography