Libros sobre el tema "Breaches"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Breaches".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Daswani, Neil y Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Texto completoS, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Buscar texto completoFoster, Peter C., Sara E. Cable, Kathleen M. Porter y Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Buscar texto completoPersonal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Buscar texto completoArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Buscar texto completoVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Texto completoWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Texto completoRita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Buscar texto completoKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.
Buscar texto completoGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.
Buscar texto completoRussell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.
Buscar texto completoOmbudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.
Buscar texto completoBelling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.
Texto completoBridging Love's Breaches. iUniverse, Inc., 2004.
Buscar texto completoY, Chow Stephen, Anthony Barbara B y Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Buscar texto completoY, Chow Stephen, Anthony Barbara B y Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Buscar texto completoDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Buscar texto completoDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Buscar texto completoFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Buscar texto completoData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Buscar texto completoCentre, National Computing, ed. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.
Buscar texto completoElbayadi, Moudy y Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.
Buscar texto completoFlanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.
Texto completoKelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.
Buscar texto completoHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Buscar texto completoHo, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.
Buscar texto completoHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Buscar texto completoCommittee on Energy and Commerce, United States House of Representatives y United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Buscar texto completoWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Buscar texto completoHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Buscar texto completoPublishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.
Buscar texto completoMoore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.
Buscar texto completoScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Buscar texto completoDanae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.
Texto completoJustice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoRicento, Thomas, Yael Peled y Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.
Buscar texto completoData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Buscar texto completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Buscar texto completoCommittee on Financial Services, United States House of Representatives y United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Buscar texto completoRicento, Thomas, Yael Peled y Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.
Buscar texto completoInformation Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.
Buscar texto completoWalker, John y Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.
Buscar texto completoLibrary, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.
Buscar texto completoData Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.
Buscar texto completoJeyanthi, N. y R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.
Buscar texto completoCombating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.
Buscar texto completo