Books on the topic 'Genomic security and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Genomic security and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Stănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.
Full textStănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.
Full textNandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.
Full textStalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.
Full textInstitute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Find full textMather, Tim. Cloud security and privacy. Beijing: O'Reilly, 2009.
Find full textKierkegaard, Sylvia Mercado. Cyberlaw, security and privacy. Ankara, Turkey: Ankara Bar Association Press, 2007.
Find full textBaek, Joonsang, and Sushmita Ruj, eds. Information Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5.
Full textLi, Yingjiu, Robert H. Deng, and Elisa Bertino. RFID Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02340-8.
Full textBoyd, Colin, and Leonie Simpson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3.
Full textVaradharajan, Vijay, and Yi Mu, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5.
Full textJuels, Ari, and Christof Paar, eds. RFID. Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25286-0.
Full textMu, Yi, Willy Susilo, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70500-0.
Full textPieprzyk, Josef, Hossein Ghodosi, and Ed Dawson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1.
Full textJang-Jaccard, Julian, and Fuchun Guo, eds. Information Security and Privacy. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21548-4.
Full textVaradharajan, Vijay, Josef Pieprzyk, and Yi Mu, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027916.
Full textPieprzyk, Josef, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0023281.
Full textBoyd, Colin, and Ed Dawson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053715.
Full textSalomon, David. Data Privacy and Security. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9.
Full textParampalli, Udaya, and Philip Hawkes, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22497-3.
Full textSusilo, Willy, Yi Mu, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3.
Full textBatten, Lynn Margaret, and Reihaneh Safavi-Naini, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780656.
Full textJiang, Richard, Somaya Al-maadeed, Ahmed Bouridane, Prof Danny Crookes, and Azeddine Beghdadi, eds. Biometric Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47301-7.
Full textBoyd, Colin, and Juan González Nieto, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1.
Full textLiu, Joseph K., and Ron Steinfeld, eds. Information Security and Privacy. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40367-0.
Full textBatten, Lynn, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0.
Full textFoo, Ernest, and Douglas Stebila, eds. Information Security and Privacy. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7.
Full textSteinfeld, Ron, and Philip Hawkes, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14081-5.
Full textCleary, Frances, and Massimo Felici, eds. Cyber Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12574-9.
Full textFelici, Massimo, ed. Cyber Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41205-9.
Full textLiu, Joseph K., and Ron Steinfeld, eds. Information Security and Privacy. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40253-6.
Full textSusilo, Willy, and Guomin Yang, eds. Information Security and Privacy. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3.
Full textDawson, E. P., A. Clark, and Colin Boyd, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964.
Full textSafavi-Naini, Rei, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45067-x.
Full textFischer-Hübner, Simone, ed. IT-Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45150-1.
Full textPieprzyk, Josef, and Suriadi Suriadi, eds. Information Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59870-3.
Full textPieprzyk, Josef, and Suriadi Suriadi, eds. Information Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0.
Full textWang, Huaxiong, Josef Pieprzyk, and Vijay Varadharajan, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98755.
Full textSusilo, Willy, and Yi Mu, eds. Information Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08344-5.
Full textBoyd, Colin, and Juan Manuel González Nieto, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137750.
Full textLiu, Joseph K., and Hui Cui, eds. Information Security and Privacy. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55304-3.
Full textPieprzyk, Josef, Rei Safavi-Naini, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48970-3.
Full textCleary, Frances, and Massimo Felici, eds. Cyber Security and Privacy. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25360-2.
Full textNguyen, Khoa, Guomin Yang, Fuchun Guo, and Willy Susilo, eds. Information Security and Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22301-3.
Full textPrivacy, security, and cyberspace. New York, NY: Facts On File, 2012.
Find full textLevine, John R. Internet privacy for dummies. New York, N.Y: Wiley Pub, 2002.
Find full textBureau of National Affairs (Washington, D.C.). Global privacy and security law. Washington, D.C: Bureau of National Affairs, 2004.
Find full textAkindolire, O. A. Security, Privacy in Modern I.T.. London: University ofEast London, 1995.
Find full textBaxter, John. State security, privacy and information. Hemel Hempstead: Harvester Wheatsheaf, 1990.
Find full textGhosh, Anup K. E-Commerce Security and Privacy. Boston, MA: Springer US, 2001.
Find full text