Libros sobre el tema "Breaches"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Breaches.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores mejores libros para su investigación sobre el tema "Breaches".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Daswani, Neil y Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

S, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Foster, Peter C., Sara E. Cable, Kathleen M. Porter y Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Personal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Arena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Van Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Wong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Rita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Krausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Great Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Russell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Ombudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Belling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Bridging Love's Breaches. iUniverse, Inc., 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Y, Chow Stephen, Anthony Barbara B y Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Y, Chow Stephen, Anthony Barbara B y Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Davidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Davidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Fowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Centre, National Computing, ed. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Elbayadi, Moudy y Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Flanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Kelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Ho, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Ho, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Ho, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Committee on Energy and Commerce, United States House of Representatives y United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Wong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Hardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Publishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Moore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Scholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Danae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.

Texto completo
Resumen
Chapter 5 addresses unilateral treaty law responses available to treaty parties against breaches of transit obligations therein, and examines whether the exceptio non adimpleti contractus has a separate existence to the rule concerning responses to material breaches under the law of treaties. It illustrates that there may be special rules in treaties that displace treaty law responses under customary international law. The analysis distinguishes treaty law responses (and the exceptio non adimpleti contractus) from countermeasures. It demonstrates that even though unilateral responses under the law of treaties may be available to treaty parties other than the defaulting transit treaty party in response to a material breach of the treaty establishing transit of energy obligations (or non-performance may as a matter of treaty interpretation be allowed by virtue of the exceptio), these do not overlap and do not exclude countermeasures under the law of international responsibility.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Ricento, Thomas, Yael Peled y Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Data Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Ranjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Committee on Financial Services, United States House of Representatives y United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Ricento, Thomas, Yael Peled y Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Information Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Walker, John y Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Library, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Data Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Jeyanthi, N. y R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Phamila, Asnath Victy y S. Geetha. Combating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía