Books on the topic 'Usable security and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Usable security and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Abraham, Ajith. Computational Social Networks: Security and Privacy. London: Springer London, 2012.
Find full textGarfinkel, Simson, and Heather Richter Lipford. Usable Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02343-9.
Full textAnalyzing and securing social networks. Boca Raton: Taylor & Francis Group, 2016.
Find full textStănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.
Full textStănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.
Full textNandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.
Full textStalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.
Full textInstitute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Find full textMather, Tim. Cloud security and privacy. Beijing: O'Reilly, 2009.
Find full textKierkegaard, Sylvia Mercado. Cyberlaw, security and privacy. Ankara, Turkey: Ankara Bar Association Press, 2007.
Find full textBaek, Joonsang, and Sushmita Ruj, eds. Information Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5.
Full textLi, Yingjiu, Robert H. Deng, and Elisa Bertino. RFID Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02340-8.
Full textBoyd, Colin, and Leonie Simpson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3.
Full textVaradharajan, Vijay, and Yi Mu, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5.
Full textJuels, Ari, and Christof Paar, eds. RFID. Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25286-0.
Full textMu, Yi, Willy Susilo, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70500-0.
Full textPieprzyk, Josef, Hossein Ghodosi, and Ed Dawson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1.
Full textJang-Jaccard, Julian, and Fuchun Guo, eds. Information Security and Privacy. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21548-4.
Full textVaradharajan, Vijay, Josef Pieprzyk, and Yi Mu, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027916.
Full textPieprzyk, Josef, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0023281.
Full textBoyd, Colin, and Ed Dawson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053715.
Full textSalomon, David. Data Privacy and Security. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9.
Full textParampalli, Udaya, and Philip Hawkes, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22497-3.
Full textSusilo, Willy, Yi Mu, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3.
Full textBatten, Lynn Margaret, and Reihaneh Safavi-Naini, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780656.
Full textJiang, Richard, Somaya Al-maadeed, Ahmed Bouridane, Prof Danny Crookes, and Azeddine Beghdadi, eds. Biometric Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47301-7.
Full textBoyd, Colin, and Juan González Nieto, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1.
Full textLiu, Joseph K., and Ron Steinfeld, eds. Information Security and Privacy. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40367-0.
Full textBatten, Lynn, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0.
Full textFoo, Ernest, and Douglas Stebila, eds. Information Security and Privacy. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7.
Full textSteinfeld, Ron, and Philip Hawkes, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14081-5.
Full textCleary, Frances, and Massimo Felici, eds. Cyber Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12574-9.
Full textFelici, Massimo, ed. Cyber Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41205-9.
Full textLiu, Joseph K., and Ron Steinfeld, eds. Information Security and Privacy. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40253-6.
Full textSusilo, Willy, and Guomin Yang, eds. Information Security and Privacy. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3.
Full textDawson, E. P., A. Clark, and Colin Boyd, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964.
Full textSafavi-Naini, Rei, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45067-x.
Full textFischer-Hübner, Simone, ed. IT-Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45150-1.
Full textPieprzyk, Josef, and Suriadi Suriadi, eds. Information Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59870-3.
Full textPieprzyk, Josef, and Suriadi Suriadi, eds. Information Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0.
Full textWang, Huaxiong, Josef Pieprzyk, and Vijay Varadharajan, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98755.
Full textSusilo, Willy, and Yi Mu, eds. Information Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08344-5.
Full textBoyd, Colin, and Juan Manuel González Nieto, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137750.
Full textLiu, Joseph K., and Hui Cui, eds. Information Security and Privacy. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55304-3.
Full textPieprzyk, Josef, Rei Safavi-Naini, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48970-3.
Full textCleary, Frances, and Massimo Felici, eds. Cyber Security and Privacy. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25360-2.
Full textNguyen, Khoa, Guomin Yang, Fuchun Guo, and Willy Susilo, eds. Information Security and Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22301-3.
Full textPrivacy, security, and cyberspace. New York, NY: Facts On File, 2012.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Permanent Subcommittee on Investigations. Online advertising and hidden hazards to consumer security and data privacy: Hearing before the Permanent Subcommittee on Investigations of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, May 15, 2014. Washington: U.S. Government Printing Office, 2014.
Find full textUnited, States Congress Senate Committee on Commerce Science and Transportation. A status update on the development of voluntary do-not-track standards: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, first session, April 24, 2013. Washington: U.S. Government Publishing Office, 2014.
Find full text