Books on the topic 'Private Data Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Private Data Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Plotkin, Stephen. Private well water quality data bank feasibility analysis for Massachusetts. Amherst, MA: University of Massachusetts Private Well Water Quality Data Bank Feasiblity Study, 1989.
Find full textBurnell, Derek. Investment expectations: A unit record analysis of data from the private new capital expenditure survey. Canberra: Australian Bureau of Statistics, 1993.
Find full textAyele, Gashaw T. Do tax structures optimize private fixed investment in sub-Saharan Africa?: A data envelopment analysis. Addis Ababa, Ethiopia: The Horn Economic and Social Policy Institute, 2015.
Find full textMario Viola de Azevedo Cunha. Market Integration Through Data Protection: An Analysis of the Insurance and Financial Industries in the EU. Dordrecht: Springer Netherlands, 2013.
Find full textDa cheng qi ye yan jiu yuan. Min ying jing ji gai bian Zhongguo: Gai ge kai fang 40 nian min ying jing ji zhu yao shu ju jian ming fen xi = Private economy changes China : concise analysis of private economy data 40-years reform and opening up. Beijing Shi: She hui ke xue wen xian chu ban she, 2018.
Find full textMal'shina, N., and Andrey Garnov. MODERN PRINCIPLES ANALYSIS OF RESOURCE FLOWS IN CRISIS CONDITIONS: CULTURE AND CREATIVE INDUSTRY. xxu: Academus Publishing, 2020. http://dx.doi.org/10.31519/978-1-4946-0018-1.
Full textLut, Yuliia. Privacy-Aware Data Analysis: Recent Developments for Statistics and Machine Learning. [New York, N.Y.?]: [publisher not identified], 2022.
Find full textBruijn, Hans. The Governance of Privacy. NL Amsterdam: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463729673.
Full textSloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. NL Amsterdam: Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.
Full textMunir, Abu Bakar. Privacy and data protection: A comparative analysis with special reference to the Malaysian proposed law. Petaling Jaya, Selangor, Malaysia: Sweet & Maxwell Asia, 2002.
Find full textCvetkov, Kalin. The impact of business process outsourcing on privacy and data protection: A thorough risk analysis. Oisterwijk, The Netherlands: Wolf Legal Publishers, 2014.
Find full textEric, Hohl, ed. Data protection and Facebook: An empirical analysis of the role of consent in social networks. Berlin: Lit, 2012.
Find full textWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001.
Find full textWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001.
Find full textWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, 2001.
Find full textWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001.
Find full textMatthew, Wright, and SpringerLink (Online service), eds. Privacy Enhancing Technologies: 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textCristofaro, Emiliano. Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textCamenisch, Jan. Privacy and Identity Management for Life. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2011.
Find full textSteven, Furnell, Theoharidou Marianthi, and SpringerLink (Online service), eds. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textChristof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textMal'shina, Nataliya, and Andrey Garnov. Culture and creative industry: the control of flow processes. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1158704.
Full textBrown, Roger J. Private Real Estate Investment: Data Analysis and Decision Making. Elsevier Science & Technology Books, 2005.
Find full textPrivate real estate investment: Data analysis and decision making. Amsterdam: Elsevier Academic Press, 2005.
Find full textMario Viola de Azevedo Cunha. Market Integration Through Data Protection: An Analysis of the Insurance and Financial Industries in the EU. Springer, 2015.
Find full textKuner, Christopher, Lee A. Bygrave, Christopher Docksey, and Laura Drechsler, eds. The EU General Data Protection Regulation (GDPR). Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198826491.001.0001.
Full textTransborder flow of personal data within the EC: A comparative analysis of the privacy statutes of the Federal Republic of Germany, France, the United Kingdom, and The Netherlands and their impact on the private sector. Deventer: Kluwer Law and Taxation Publishers, 1990.
Find full textAkcinaroglu, Seden, and Elizabeth Radziszewski. Private Militaries and the Security Industry in Civil Wars. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197520802.001.0001.
Full textCowhey, Peter F., and Jonathan D. Aronson. Data Privacy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0008.
Full textMatsumi, Hideyuki, Dara Hallinan, Diana Dimitrova, Eleni Kosta, and Paul De Hert, eds. Data Protection and Privacy, Volume 16. Hart Publishing, 2024. http://dx.doi.org/10.5040/9781509975976.
Full textFast Software Encryption 16th International Workshop Fse 2009 Leuven Belgium February 2225 2009 Revised Selected Papers. Springer, 2009.
Find full textEvans, Jeff, Sally Ruane, and Humphrey Southall, eds. Data in Society. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781447348214.001.0001.
Full textAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley & Sons, Incorporated, John, 2017.
Find full textAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley & Sons, Limited, John, 2017.
Find full textAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley & Sons, Incorporated, John, 2017.
Find full textAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley, 2017.
Find full textRand, John, and Finn Tarp, eds. Micro, Small, and Medium Enterprises in Vietnam. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198851189.001.0001.
Full textEsayas, Samson Y. Data Privacy and Competition Law in the Age of Big Data. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198891420.001.0001.
Full textGhali, Sofiane, and Habib Zitouna. Labor Demand in Tunisia. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198799863.003.0002.
Full textHornuf, Lars, and Gregor Dorfleitner. FinTech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations. Springer, 2019.
Find full textKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer, 2013.
Find full textKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer, 2013.
Find full textKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer London, Limited, 2013.
Find full textHornuf, Lars, and Gregor Dorfleitner. FinTech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations. Springer International Publishing AG, 2020.
Find full textKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer Netherlands, 2016.
Find full textKnaack, Peter. A Web without a Center. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190864576.003.0009.
Full textRao, C. R., Arijit Chaudhuri, and Tasos C. Christofides. Data Gathering, Analysis and Protection of Privacy Through Randomized Response Techniques: Qualitative and Quantitative Human Traits. Elsevier Science & Technology, 2016.
Find full textRoyal Society (Great Britain) Staff. Protecting Privacy in Practice: The Current Use, Development and Limits of Privacy Enhancing Technologies in Data Analysis. Royal Society, The, 2019.
Find full textMicklitz, Hans-W., Oreste Pollicino, Amnon Reichman, Andrea Simoncini, Giovanni Sartor, and Giovanni De Gregorio, eds. Constitutional Challenges in the Algorithmic Society. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108914857.
Full text