Libros sobre el tema "Data access control policies"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Data access control policies".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Amatayakul, Margaret K. The no-hassle guide to EHR policies. Marblehead, MA: HCPro, 2006.
Buscar texto completoWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 8. Sausalito, Calif: InfoSecurity Infrastructure, 2001.
Buscar texto completoWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 5. Sausalito, Ca: Baseline Software, 1996.
Buscar texto completoWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 7. Sausalito, Calif: Baseline Software, 1999.
Buscar texto completoHsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.
Buscar texto completoMiyashita, Hiroshi. Kojin jōhō hogo no shisaku: Policies on the protection of personal information : kajō hannō no kaishō ni mukete. Tōkyō: Chōyōkai, 2010.
Buscar texto completoNeale, Hooper, ed. Open access policies, practices and licensing: A review of the literature in Australia and selected jurisdictions. Brisbane: Queensland University of Technology, 2009.
Buscar texto completoJustitiedepartementet, Sweden. Två frågor om sekretess hos Säkerhetspolisen. Stockholm]: Regeringskansliet, Justitiedepartementet, 2001.
Buscar texto completoP. J. D. J. Muijen. Handleiding politie & privacy: De betekenis van de Wet Persoonsregistraties en de Wet Politieregisters voor de politiepraktijk. Lochem: Van den Brink, 1991.
Buscar texto completoBelair, Robert R. Criminal justice information policy: Data quality of criminal history records. Washington, D.C: U.S. Dept. of Justice, Bureau of Justice Statistics, 1985.
Buscar texto completoKoelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.
Buscar texto completoKoelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.
Buscar texto completoCarnahan Conference on Security Technology (1987 Atlanta, Ga.). Proceedings: 1987 Carnahan Conference on Security Technology : Electronic crime countermeasures, July 15-17, 1987. Editado por Jackson John S, De Vore R. William y Institute of Electrical and Electronics Engineers. Lexington Section. [Lexington, KY]: Office of Engineering Services, University of Kentucky, 1987.
Buscar texto completoFerrari, Elena. Access Control in Data Management Systems. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.
Texto completoAccess control in data management systems. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2010.
Buscar texto completoZhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Buscar texto completode, Guchteneire Paul, Mochmann Ekkehard, Sociall- Wetenschappelijk Informatie- en Documentatiecentrum (Koninklijke Nederlandse Akademie van Wetenschappen) y International Federation of Data Organizations for the Social Sciences., eds. Data protection and data access: Reports from ten countries on data protection and data access in social research, with an annotated international bibliography. Amsterdam, Netherlands: SWIDOC/IFDO, 1990.
Buscar texto completoSarli, Cathy, Ellen Dubinsky y Bob Engeszer. Public access policies. Washington, D.C: Association of Research Libraries, 2009.
Buscar texto completoKoelewijn, Wouter Immánuël. Privacy en politiegegevens: Over geautomatiseerde normatieve informatie-uitwisseling. [Leiden, Netherlands]: Leiden University Press, 2009.
Buscar texto completoRemote access essentials. Boston: AP Professional, 1996.
Buscar texto completode, Guchteneire Paul, Mochman Ekkehard, Sociaal-Wetebschappelijk Informatieen Documentatiecentrum van de Koninklijke Akademie van Wetenschappen. y International Federation of Data Organizations for the Social Sciences., eds. Data protection and access: Reports from ten countries on data protection and data access in social research, with an annotated international bibliography. Amsterdam: North-Holland, 1990.
Buscar texto completoBritain, Great. Data protection: The Access to Health Records (Control of Access) Regulations 1993. London: HMSO, 1993.
Buscar texto completoBaker, Dixie B. Assessing controlled access protection. [Ft. George G. Meade, MD] (9800 Savage Rd., Ft. George G. Meade 20755-6000): National Computer Security Center, 1992.
Buscar texto completoRichard, Browning, ed. Global monitoring: The challenges of access to data. London: UCL Press, 2005.
Buscar texto completoNational Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Buscar texto completoBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Buscar texto completoInc, Regulatory Compliance Associates, ed. Protecting customer privacy: Management process from policies to quality control checklists. Austin, Tex: Sheshunoff Information Services, 2000.
Buscar texto completoFreddy, Kosten, ed. Managing data protection. 2a ed. Oxford: Butterworth-Heinemann, 1994.
Buscar texto completoIFIP TC 11/WG 11.3 Conference on Data and Applications Security (18th 2004 Sitges, Spain). Research directions in data and applications security XVIII: IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. Boston: Kluwer Academic Publishers, 2004.
Buscar texto completoCsilla, Farkas y Samarati Pierangela, eds. Research directions in data and applications security XVIII: IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. Boston: Kluwer Academic Publishers, 2004.
Buscar texto completoJasper, Kim. User access & information protection: Managing open access & information protection. Hamburg [Germany]: PROJECT CONSULT, 2002.
Buscar texto completoIntroduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.
Buscar texto completoInformation protection and other unnatural acts: Every manager's guide to keeping vital computer data safe and sound. New York, NY: Amacom, 1992.
Buscar texto completoWare, Willis H. Perspectives on trusted computer systems. Santa Monica, CA: Rand, 1988.
Buscar texto completoP. C. M. van der Enden. Privacy: Een kwaliteitsaspect van informatie-systemen. Alphen aan den Rijn: Samsom, 1988.
Buscar texto completoMicrocomputer data security: Issues and strategies. New York, NY: Prentice Hall Press, 1986.
Buscar texto completoM, Pounder C. N. y Chartered Institute of Public Finance and Accountancy., eds. Managing data protection. London: CIPFA, 1987.
Buscar texto completoMogollon, Manuel. Cryptography and security services: Mechanisms and applications. Hershey, PA: CyberTech Pub., 2007.
Buscar texto completoJordan, Carole S. A Guide to understanding discretionary access control in trusted systems. [Fort George G. Meade, MD]: National Computer Security Center, 1987.
Buscar texto completoHeld, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Buscar texto completoKathy, Kelso, Canadian Legal Information Centre y Alamar Education Incorporated, eds. Electronic legal information: Exploring access issues. [Ottawa]: The Centre, 1991.
Buscar texto completoR, Lowe Michael, Servais Cheryl E y American Health Information Management Association, eds. The legal health record: Regulations, policies, and guidelines. 2a ed. Chicago, Ill: American Health Information Management Association, 2011.
Buscar texto completoMargaret, Jackson. Hughes on data protection in Australia. 2a ed. Sydney: Lawbook Co., 2001.
Buscar texto completoPierce, Clayton C. Classical ciphers. [Ventura, CA]: C.C. Pierce, 1999.
Buscar texto completoCryptoPrivacy. Ventura, CA: C.C. Pierce, 1989.
Buscar texto completoExploring electronic health records. [Place of publication not identified]: Paradigm Publishing, Inc, 2014.
Buscar texto completoSchaum's outlines medical charting. Chicago: McGraw-Hill, 2012.
Buscar texto completoSeipel, Peter. ADB-upptagningars offentlighet: Rapport till Data- och offentlighetskommittén. Stockholm: Institutet för rättsinformatik, Stockholms universitet, 1988.
Buscar texto completoVictoria. Office of the Victorian Privacy Commissioner. Mr C's case: Report of an investigation pursuant to Part 6 of the Information Privacy Act 2000 into Victoria Police and Department of Justice in relation to the security of personal information in the Law Enforcement Assistance Program (LEAP) and E* Justice databases. Melbourne: Office of the Victorian Privacy Commissioner, 2006.
Buscar texto completoPenney, Jonathon W. Open connectivity, open data: Two dimensions of the freedom to seek, receive and impart information. Wellington, N.Z.]: Victoria University of Wellington, 2012.
Buscar texto completo