Books on the topic 'Privicy protection'

To see the other types of publications on this topic, follow the link: Privicy protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Privicy protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rodrigues, Rowena, and Vagelis Papakonstantinou, eds. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Caloyannides, Michael A. Privacy protection and computer forensics. 2nd ed. Boston: Artech House, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

George, Yee, ed. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Spivet, Bonnie. Protecting your privacy online. New York, NY: PowerKids Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Hao. Protecting Privacy in China. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21750-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Inc, Regulatory Compliance Associates, ed. NAFCU's protecting member privacy. Austin, Tex: Sheshunoff Information Services/Thomson Financial, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Israel. Protection of Privacy Law, 5741-1981. 2nd ed. [Haifa?]: A. Greenfield-A.G. Publications, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jøsang, Audun, Lynn Futcher, and Janne Hagen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Qu, Youyang, Mohammad Reza Nosouhi, Lei Cui, and Shui Yu. Personalized Privacy Protection in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Meng, Weizhi, Simone Fischer-Hübner, and Christian D. Jensen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Janczewski, Lech Jan, and Mirosław Kutyłowski, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Federrath, Hannes, and Dieter Gollmann, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström, and André Zúquete, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hoepman, Jaap-Henk, and Stefan Katzenbeisser, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans, eds. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

De Capitani di Vimercati, Sabrina, and Fabio Martinelli, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hölbl, Marko, Kai Rannenberg, and Tatjana Welzer, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Xinxin, and Xiaolin Li. Location Privacy Protection in Mobile Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9074-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Elngar, Ahmed, Ambika Pawar, and Prathamesh Churi. Data Protection and Privacy in Healthcare. Edited by Ahmed Elngar, Ambika Pawar, and Prathamesh Churi. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

1943-, Rule James B., and Greenleaf G. W, eds. Global privacy protection: The first generation. Cheltenham, UK: Edward Elgar, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Meyer, Norbert, and Anna Grocholewska-Czuryło, eds. ICT Systems Security and Privacy Protection. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Peter, Carey. E-privacy and online data protection. London: Butterworths, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Israel. Protection of privacy law, 5741-1981. 3rd ed. [Haifa]: A. Greenfield-A.G. Publications, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kayser, Pierre. La protection de la vie privée. 2nd ed. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bainbridge, David I. EC data protection directive. London: Butterworths, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Institute, Pennsylvania Bar, ed. Privacy & security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Hao. Protecting privacy in China: A research on China's privacy standards and the possibility of establishing the right to privacy and the information privacy protection legislation in modern China. Heidelberg: Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

1960-, Maurer Urs, and Faruque Nadine 1960-, eds. Datenschutz =: Protection des données = Data protection. Basel: Helbing & Lichtenhahn, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lauter, Kristin, Wei Dai, and Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Livraga, Giovanni. Protecting Privacy in Data Release. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Senior, Andrew, ed. Protecting Privacy in Video Surveillance. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Andrew, Senior, ed. Protecting privacy in video surveillance. Dordrecht: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mooney, Carla. Online privacy and business. San Diego, CA: ReferencePoint Press, Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Noon, E. Personal Privacy Protection Guide : A Practical Guide to Protecting Your Privacy. On One Inc, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Biobanks are critical infrastructure for medical research. Biobanks, however, are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy rights and rights holders should be protected and to what extent? Since 25 May 2018, the General Data Protection Regulation (GDPR) has applied and now occupies a key position in the European legal framework for the regulation of biobanking. This book takes an in-depth look at the function, problems, and opportunities presented by European data protection law under the GDPR as a framework for the protection of genetic privacy in biobanking. It argues that the substantive framework presented by the GDPR already offers an admirable baseline level of protection for the range of genetic privacy rights engaged by biobanking. The book further contends that while numerous problems with this standard of protection are indeed identifiable, the GDPR offers the flexibility to accommodate solutions to these problems, as well as the procedural mechanisms to realise these solutions.
43

Hallinan, Dara. Protecting Genetic Privacy in Biobanking Through Data Protection Law. Oxford University Press, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rule, James, and Graham Greenleaf. Global Privacy Protection. Edward Elgar Publishing, 2008. http://dx.doi.org/10.4337/9781848445123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Protecting privacy. Oxford: Oxford University Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Santiago, J. K. !nternet Privacy Protection Guide. Boggy Cove Pub, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wacks, Raymond. 6. The death of privacy? Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Privacy is under attack from several quarters. The ‘war on terror’ has amplified this pressure. The Internet, increased surveillance, and sensationalist journalism seriously undermine individuals’ control over their private lives. Many advocates believe that the protection of privacy stands in need of urgent renewal. Has the Internet sounded privacy’s death knell? The rapid advance of information technology, especially the Internet, has generated widespread concern about protection of personal data, with many jurisdictions adopting data protection legislation. Ironically, technology generates both the malady and part of the cure. While the law is rarely an effective tool against the dedicated intruder, advances in protective software, along with fair information practices of the European Directive and laws of several jurisdictions, afford a rational and sound normative framework for the collection, use, and transfer of personal data. Some of these questions—likely to dominate 21st-century discussions of privacy—are considered in this concluding chapter.
48

Newman, Bobbi, and Bonnie Tijerina. Protecting Patron Privacy. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Donnellan, Craig. Protecting Our Privacy. Independence Educational Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Beckstrom, Matthew. Protecting Patron Privacy. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216002277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research―if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

To the bibliography