Books on the topic 'Security of private data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security of private data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Salomon, David. Data Privacy and Security. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9.
Full textRao, Udai Pratap, Sankita J. Patel, Pethuru Raj, and Andrea Visconti, eds. Security, Privacy and Data Analytics. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9089-1.
Full textPrivacy and data security law deskbook. [Frederick, MD]: Aspen Publishers, 2010.
Find full textLivraga, Giovanni, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management and Security Assurance. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6.
Full textGarcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management, and Security Assurance. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29883-2.
Full textGarcia-Alfaro, Joaquin, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9.
Full textCavanagh, Thomas E. Preparedness in the private sector. [New York?]: The Conference Board, 2008.
Find full textservice), SpringerLink (Online, ed. Quantum private communication. Beijing: Higher Education Press, 2010.
Find full textInstitute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Find full textKaufman, Charlie. Network security: Private communication in a public world. Englewood Cliffs, New Jersey: PTR Prentice Hall, 1995.
Find full textRadia, Perlman, and Speciner Michael, eds. Network security: Private communication in a public world. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 2002.
Find full textWugmeister, Miriam, and Christine E. Lyon. Global employee privacy and data security law. Edited by Morrison & Foerster. 2nd ed. Arlington, VA: BNA Books, 2011.
Find full textGarcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Ana Cavalli, and Jean Leneutre, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19348-4.
Full textCuppens-Boulahia, Nora, Frédéric Cuppens, and Joaquin Garcia-Alfaro, eds. Data and Applications Security and Privacy XXVI. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31540-4.
Full textLi, Yingjiu, ed. Data and Applications Security and Privacy XXV. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22348-8.
Full textAtluri, Vijay, and Günther Pernul, eds. Data and Applications Security and Privacy XXVIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4.
Full textWang, Lingyu, and Basit Shafiq, eds. Data and Applications Security and Privacy XXVII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39256-6.
Full textKerschbaum, Florian, and Stefano Paraboschi, eds. Data and Applications Security and Privacy XXXII. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95729-6.
Full textForesti, Sara, and Sushil Jajodia, eds. Data and Applications Security and Privacy XXIV. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13739-6.
Full textSinghal, Anoop, and Jaideep Vaidya, eds. Data and Applications Security and Privacy XXXIV. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49669-2.
Full textLivraga, Giovanni, and Sencun Zhu, eds. Data and Applications Security and Privacy XXXI. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61176-1.
Full textGarcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, and Yves Roudier, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11207-2.
Full textDi Pietro, Roberto, Javier Herranz, Ernesto Damiani, and Radu State, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35890-6.
Full textGarcia-Alfaro, Joaquin, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, and William M. Fitzgerald, eds. Data Privacy Management and Autonomous Spontaneous Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9.
Full textGarcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, and Sabrina de Capitani di Vimercati, eds. Data Privacy Management and Autonomous Spontaneus Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28879-1.
Full textRanise, Silvio, and Vipin Swarup, eds. Data and Applications Security and Privacy XXX. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41483-6.
Full textSamarati, Pierangela, ed. Data and Applications Security and Privacy XXIX. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7.
Full textFoley, Simon N., ed. Data and Applications Security and Privacy XXXIII. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0.
Full textWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Full textDas, Pradip Kumar, Hrudaya Kumar Tripathy, and Shafiz Affendi Mohd Yusof, eds. Privacy and Security Issues in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1007-3.
Full textBarker, Ken, and Kambiz Ghazinour, eds. Data and Applications Security and Privacy XXXV. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3.
Full textVaidya, Jaideep. Privacy preserving data mining. New York: Springer, 2006.
Find full textDang, Tran Khanh, Josef Küng, Makoto Takizawa, and Tai M. Chung, eds. Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4370-2.
Full textDang, Tran Khanh, Josef Küng, Tai M. Chung, and Makoto Takizawa, eds. Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8062-5.
Full textKlosek, Jacqueline. Data privacy in the information age. Westport, Conn: Quorum Books, 2000.
Find full textGreen, Gion. Introduction to security. 4th ed. Boston: Butterworths, 1987.
Find full textPetković, Milan, and Willem Jonker, eds. Security, Privacy, and Trust in Modern Data Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6.
Full textAltshuler, Yaniv. Security and Privacy in Social Networks. New York, NY: Springer New York, 2013.
Find full textE, Ludloff Mary, ed. Privacy and big data. Sebastopol, CA: O'Reilly Media, 2011.
Find full textRussell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Find full textT, Gangemi G., ed. Computer security basics. Sebastopol, CA: O'Reilly & Associates, 1991.
Find full textPaul, Wolfe, and Erwin Mike 1969-, eds. Virtual Private Networks. 2nd ed. Beijing [China]: O'Reilly, 1999.
Find full text1969-, Erwin Mike, and Wolfe Paul, eds. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.
Find full textYu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Boston, MA: Springer-Verlag US, 2009.
Find full textMeng, Weizhi, and Steven Furnell, eds. Security and Privacy in Social Networks and Big Data. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0758-8.
Full textXiang, Yang, Zheli Liu, and Jin Li, eds. Security and Privacy in Social Networks and Big Data. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9031-3.
Full textLin, Limei, Yuhong Liu, and Chia-Wei Lee, eds. Security and Privacy in Social Networks and Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-7913-1.
Full textFriedewald, Michael, Stephan Krenn, Ina Schiering, and Stefan Schiffner, eds. Privacy and Identity Management. Between Data Protection and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99100-5.
Full textAbrams, Marshall D. Tutorial computer and network security. Washington, D.C: IEEE Computer Society Press, 1987.
Find full textPfleeger, Charles P. Security in computing. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 1997.
Find full text