Books on the topic 'Data Protection – Australia'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data Protection – Australia.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Hughes, Gordon. Data protection in Australia. Sydney: Law Book Co., 1991.
Find full textMargaret, Jackson. Hughes on data protection in Australia. 2nd ed. Sydney: Lawbook Co., 2001.
Find full textTucker, Greg. Information privacy law in Australia. Melbourne, Australia: Longman Professional, 1992.
Find full textClark, E. Eugene. Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.
Find full textClark, E. Eugene. Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.
Find full textCyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.
Find full textWestern Australia. Office of the Attorney General. Privacy legislation for Western Australia policy research paper. Perth, , WA: Privacy Working Group, 2003.
Find full textACISP 2004 (2004 Sydney, N.S.W.). Information security and privacy: 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings. Berlin: Springer, 2004.
Find full text1944-, Seberry Jennifer, and Zheng Yuliang 1962-, eds. Advances in cryptology--AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Find full text1949-, Pieprzyk Josef, and Seberry Jennifer 1944-, eds. Information security and privacy: First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings. Berlin: Springer, 1996.
Find full textVijay, Varadharajan, Pieprzyk Josef 1949-, and Mu Yi, eds. Information security and privacy: Second Australian Conference, ACISP '97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings. Berlin: Springer, 1997.
Find full textJohnston, Ingrid. Linking SAAP, child protection and juvenile justice data collections: A feasibility study. Canberra: Australian Institute of Health and Welfare, 2008.
Find full textJohnston, Ingrid. Linking SAAP, child protection and juvenile justice data collections: A feasibility study. Canberra: Australian Institute of Health and Welfare, 2008.
Find full text1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full text1949-, Pieprzyk Josef, Ghodosi Hossein, and Dawson Ed, eds. Information security and privacy: 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings. Berlin: Springer, 2007.
Find full textPerspectives on privacy: Increasing regulation in the USA, Canada, Australia and European countries. Berlin: Boston, 2014.
Find full textM, González Nieto Juan, ed. Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 proceedings. New York: Springer, 2009.
Find full textDouglas-Stewart, Jeremy. Annotated national privacy principles. 2nd ed. Adelaide, SA: Presidian Legal Publications, c2005., 2005.
Find full textDouglas-Stewart, Jeremy. Annotated national privacy principles. Adelaide: Presidian Legal Publications, 2003.
Find full textACISP '98 (1998 Brisbane, Qld.). Information security and privacy: Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings. Berlin: Springer, 1998.
Find full textVijay, Varadharajan, and Mu Yi, eds. Information security and privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings. New York: Springer, 2001.
Find full textColin, Boyd, Clark Andrew 1971-, and Dawson Ed, eds. Information security and privacy: 5th Australasian Conference, ACISP '2000, Brisbane, Australia, July 10-12, 2000 : proceedings. New York: Springer, 2000.
Find full textLaw Library of Congress (U.S.). Global Legal Research Directorate. Online privacy law: Australia, Canada, France, Germany, Israel, Italy, Japan, Netherlands, Portugal, Spain, Sweden, and the United Kingdom. [Washington, D.C.]: Law Library of Congress, Global Legal Research Center, 2012.
Find full textBoyd, Colin. Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textYi, Mu, Seberry Jennifer, and SpringerLink (Online service), eds. Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textReihanah, Safavi-Naini, and Yung Moti, eds. Digital rights management: Technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers. Berlin: Springer, 2006.
Find full textLiqun, Chen, Mu Yi 1955-, and Susilo Willy, eds. Information security practice and experience: 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings. Berlin: Springer, 2008.
Find full textDavid, Hutchison. Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textJadwiga, Indulska, ed. Pervasive computing: 6th international conference, Pervasive 2008, Sydney, Australia, May 19-22, 2008 : proceedings. Berlin: Springer, 2008.
Find full textBagaric, Mirko, and Carolyn Doyle. Privacy Law in Australia. Federation Press, 2005.
Find full textMu, Yi, Willy Susilo, and Joseph K. Liu. Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings. Springer London, Limited, 2007.
Find full textKukutai, Tahu. Indigenous Data Sovereignty: Toward an agenda. ANU Press, 2016.
Find full textPieprzyk, Josef, Vijay Varadharajan, and Huaxiong Wang. Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings. Springer London, Limited, 2004.
Find full textPieprzyk, Josef, Ed Dawson, and Hossein Ghodosi. Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings. Springer London, Limited, 2007.
Find full text(Editor), Lynn Batten, and Jennifer Seberry (Editor), eds. Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings (Lecture Notes in Computer Science). Springer, 2002.
Find full textMu, Yi, Liqun Chen, and Willy Susilo. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings. Springer London, Limited, 2008.
Find full textPieprzyk, Josef, Jennifer Seberry, and Rei Safavi-Naini. Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings. Springer London, Limited, 2007.
Find full text(Editor), Colin Boyd, and Ed Dawson (Editor), eds. Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings (Lecture Notes in Computer Science). Springer, 1998.
Find full textInformation Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings (Lecture Notes in Computer Science). Springer, 2004.
Find full textSeberry, Jennifer, and Lynn Batten. Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings. Springer London, Limited, 2003.
Find full textInformation Security And Privacy 18th Australasian Conference Acisp 2013 Brisbane Qld Australia July 13 2013 Proceedings. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.
Find full text(Editor), Josef Pieprzyk, Rei Safavi-Naini (Editor), and Jennifer Seberry (Editor), eds. Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (Lecture Notes in Computer Science). Springer, 1999.
Find full textMu, Yi, and Vijay Varadharajan. Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Springer London, Limited, 2003.
Find full textSeberry, Jennifer, and Rei Safavi-Naini. Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Springer London, Limited, 2003.
Find full textDörr, Dieter, and Russell L. Weaver. Perspectives on Privacy: Increasing Regulation in the USA, Canada, Australia and European Countries. de Gruyter GmbH, Walter, 2014.
Find full textDörr, Dieter, and Russell L. Weaver. Perspectives on Privacy: Increasing Regulation in the USA, Canada, Australia and European Countries. de Gruyter GmbH, Walter, 2014.
Find full textMao, Shiwen, Pascal Lorenz, Feng Yan, Jun Zheng, and Wei Xiang. Ad Hoc Networks: 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings. Springer, 2018.
Find full text(Editor), Rei Safavi-Naini, and Jennifer Seberry (Editor), eds. Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings (Lecture Notes in Computer Science). Springer, 2003.
Find full text(Editor), Vijav Varadharajan, Josef Pieprzyk (Editor), and Yi Mu (Editor), eds. Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (Lecture Notes in Computer Science). Springer, 1997.
Find full text(Editor), Josef Pieprzyk, and Jennifer Seberry (Editor), eds. Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings (Lecture Notes in Computer Science). Springer, 1996.
Find full text