Books on the topic 'Data security and protection'

To see the other types of publications on this topic, follow the link: Data security and protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data security and protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Endrijonas, Janet. Data security. Rocklin, Calif: Prima Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rao, Yarlagadda R. K., ed. Data transportation and protection. New York: Plenum Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1947-, Daler T., ed. Security of information and data. Chichester: E. Horwood, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Butterworth's data security law & practice. London: LexisNexis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ziegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Security and data protection with SAP systems. New York: Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Data protection for virtual data centers. Indianapolis, Ind: Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Data protection: Governance, risk management, and compliance. Boca Raton, FLA: Taylor & Francis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Designing information systems security. Chichester [England]: Wiley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Canada, Canada Government Services, ed. Information technology security handbook. Ontario: Government Services Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

International Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

International Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

International Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

International Conference on Data Mining (9th 2008 Cadiz, Spain). Data mining IX: Data mining, protection, detection and other security technologies. Edited by Zanasi A. Southampton: WIT, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

International Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

International Conference on Data Mining (9th 2008 Cadiz, Spain). Data mining IX: Data mining, protection, detection and other security technologies. Edited by Zanasi A. Southampton: WIT, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gratton, Pierre. La protection des ressources informatiques. Paris, France, Editions d'organisation: Editions G. Vermette, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Perlman, C. Max, Sara E. Cable, Kathleen M. Porter, and James T. Towne. Fundamentals of data security law. [Boston, MA]: MCLE, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Perlman, C. Max, Kathleen M. Porter, Shannon Choy-Seymour, and Mary-Pat Cormier. Fundamentals of data security law. Boston, MA: MCLE New England, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Information Systems Audit and Control Foundation, ed. E-commerce security: Securing the network perimeter. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

McNally & co. [from old catalog] Rand. The 1998 Data Protection Act. London: Stationery Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Privacy and data security law deskbook. [Frederick, MD]: Aspen Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

McCann, Tiffany. Information security: Keeping data safe. Morristown, NJ: FEI Research Foundation, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ganger, Devin L. Mastering system center Data protection manager 2007. Indianapolis, Ind: Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Klosek, Jacqueline. Data privacy in the information age. Westport, Conn: Quorum Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

1952-, Gordon John, ed. Practical data security. Aldershot, England: Ashgate, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Guerra, Peter, and Drew Farris. Data Security for Modern Enterprises: Data Security in the World of Cloud Computing, Big Data, Data Science, and Modern Attacks. O'Reilly Media, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Deloitte Haskins & Sells., ed. Computers and data protection. Deloitte Haskins & Sells, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Brocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

American Bar Association. Section of Antitrust Law., ed. Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

W.H.J. Brockx (Compiler), M. C. Kersten (Compiler), B.G.H. van Liemt (Compiler), and A. van Zanten (Compiler), eds. Data Security Manual: Guidelines and Procedures for Data Protection. Springer, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Brocx, W. H. J. Data Security Manual: Guidelines and Procedures for Data Protection. D Reidel Pub Co, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Committee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Data Security: The Discussion Draft of Data Protection Legislation. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Brocx, W. H. J. Data Security Manual: Guidelines and Procedures for Data Protection. D Reidel Pub Co, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Brocx, W. H. J. Data Security Manual: Guidelines and Procedures for Data Protection. D Reidel Pub Co, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Fahy, Bob. Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals. Elsevier, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Fahy, Bob. Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Data Privacy and Security. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

E, Ettinger J., ed. Information security. London: Chapman & Hall, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Heard, Nicholas, Patrick Rubin-Delanchy, and Melissa Turcotte. Data Science for Cyber-Security. World Scientific Publishing Co Pte Ltd, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Elbra, R. A. Security and the 1984 Data Protection Act. Blackwell Publishers, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Aljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ziegler, Sébastien. Internet of Things Security and Data Protection. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Data Protection and Security for Personal Computers. Elsevier, 1992. http://dx.doi.org/10.1016/c2009-0-13928-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

ONLINE BANKING SECURITY MEASURES AND DATA PROTECTION. IGI GLOBAL, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Aljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography