Libros sobre el tema "Privicy protection"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Privicy protection.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores mejores libros para su investigación sobre el tema "Privicy protection".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Rodrigues, Rowena y Vagelis Papakonstantinou, eds. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Caloyannides, Michael A. Privacy protection and computer forensics. 2a ed. Boston: Artech House, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

George, Yee, ed. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Spivet, Bonnie. Protecting your privacy online. New York, NY: PowerKids Press, 2012.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Wang, Hao. Protecting Privacy in China. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21750-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Inc, Regulatory Compliance Associates, ed. NAFCU's protecting member privacy. Austin, Tex: Sheshunoff Information Services/Thomson Financial, 2000.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Israel. Protection of Privacy Law, 5741-1981. 2a ed. [Haifa?]: A. Greenfield-A.G. Publications, 1994.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Jøsang, Audun, Lynn Futcher y Janne Hagen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Qu, Youyang, Mohammad Reza Nosouhi, Lei Cui y Shui Yu. Personalized Privacy Protection in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Meng, Weizhi, Simone Fischer-Hübner y Christian D. Jensen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Janczewski, Lech Jan y Mirosław Kutyłowski, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Federrath, Hannes y Dieter Gollmann, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström y André Zúquete, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Hoepman, Jaap-Henk y Stefan Katzenbeisser, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam y Thierry Sans, eds. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

De Capitani di Vimercati, Sabrina y Fabio Martinelli, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Hölbl, Marko, Kai Rannenberg y Tatjana Welzer, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Liu, Xinxin y Xiaolin Li. Location Privacy Protection in Mobile Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9074-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Elngar, Ahmed, Ambika Pawar y Prathamesh Churi. Data Protection and Privacy in Healthcare. Editado por Ahmed Elngar, Ambika Pawar y Prathamesh Churi. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

1943-, Rule James B. y Greenleaf G. W, eds. Global privacy protection: The first generation. Cheltenham, UK: Edward Elgar, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Meyer, Norbert y Anna Grocholewska-Czuryło, eds. ICT Systems Security and Privacy Protection. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Peter, Carey. E-privacy and online data protection. London: Butterworths, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Israel. Protection of privacy law, 5741-1981. 3a ed. [Haifa]: A. Greenfield-A.G. Publications, 1994.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Kayser, Pierre. La protection de la vie privée. 2a ed. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1990.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Bainbridge, David I. EC data protection directive. London: Butterworths, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Institute, Pennsylvania Bar, ed. Privacy & security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Wang, Hao. Protecting privacy in China: A research on China's privacy standards and the possibility of establishing the right to privacy and the information privacy protection legislation in modern China. Heidelberg: Springer, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

1960-, Maurer Urs y Faruque Nadine 1960-, eds. Datenschutz =: Protection des données = Data protection. Basel: Helbing & Lichtenhahn, 1994.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Lauter, Kristin, Wei Dai y Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Livraga, Giovanni. Protecting Privacy in Data Release. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Senior, Andrew, ed. Protecting Privacy in Video Surveillance. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Andrew, Senior, ed. Protecting privacy in video surveillance. Dordrecht: Springer, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Mooney, Carla. Online privacy and business. San Diego, CA: ReferencePoint Press, Inc., 2015.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Noon, E. Personal Privacy Protection Guide : A Practical Guide to Protecting Your Privacy. On One Inc, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Hallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Resumen
Biobanks are critical infrastructure for medical research. Biobanks, however, are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy rights and rights holders should be protected and to what extent? Since 25 May 2018, the General Data Protection Regulation (GDPR) has applied and now occupies a key position in the European legal framework for the regulation of biobanking. This book takes an in-depth look at the function, problems, and opportunities presented by European data protection law under the GDPR as a framework for the protection of genetic privacy in biobanking. It argues that the substantive framework presented by the GDPR already offers an admirable baseline level of protection for the range of genetic privacy rights engaged by biobanking. The book further contends that while numerous problems with this standard of protection are indeed identifiable, the GDPR offers the flexibility to accommodate solutions to these problems, as well as the procedural mechanisms to realise these solutions.
43

Hallinan, Dara. Protecting Genetic Privacy in Biobanking Through Data Protection Law. Oxford University Press, 2021.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Rule, James y Graham Greenleaf. Global Privacy Protection. Edward Elgar Publishing, 2008. http://dx.doi.org/10.4337/9781848445123.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Protecting privacy. Oxford: Oxford University Press, 1999.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Santiago, J. K. !nternet Privacy Protection Guide. Boggy Cove Pub, 1999.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Wacks, Raymond. 6. The death of privacy? Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0006.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Resumen
Privacy is under attack from several quarters. The ‘war on terror’ has amplified this pressure. The Internet, increased surveillance, and sensationalist journalism seriously undermine individuals’ control over their private lives. Many advocates believe that the protection of privacy stands in need of urgent renewal. Has the Internet sounded privacy’s death knell? The rapid advance of information technology, especially the Internet, has generated widespread concern about protection of personal data, with many jurisdictions adopting data protection legislation. Ironically, technology generates both the malady and part of the cure. While the law is rarely an effective tool against the dedicated intruder, advances in protective software, along with fair information practices of the European Directive and laws of several jurisdictions, afford a rational and sound normative framework for the collection, use, and transfer of personal data. Some of these questions—likely to dominate 21st-century discussions of privacy—are considered in this concluding chapter.
48

Newman, Bobbi y Bonnie Tijerina. Protecting Patron Privacy. Rowman & Littlefield Publishers, Incorporated, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Donnellan, Craig. Protecting Our Privacy. Independence Educational Publishers, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Beckstrom, Matthew. Protecting Patron Privacy. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216002277.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Resumen
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research―if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

Pasar a la bibliografía