Libros sobre el tema "Sensitive date"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Sensitive date".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Buscar texto completoChristen, Peter, Thilina Ranbaduge y Rainer Schnell. Linking Sensitive Data. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.
Texto completoPhotopoulos, Constantine. Managing catastrophic loss of sensitive data. Burlington, MA: Syngress Pub., 2008.
Buscar texto completoClaire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruxelles: Bruylant, 2007.
Buscar texto completoOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.
Buscar texto completoGreat Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. London: Stationery Office, 2002.
Buscar texto completoDaniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2a ed. Atlanta, Ga: Georgia State Univ. Business Press, 1993.
Buscar texto completoComputer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Alexandria, Va. (PO Box 10255, Alexandria 22310): Computer Security Analysts, 1986.
Buscar texto completoE, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Beverly Hills: Sage Publications, 1986.
Buscar texto completoStaszkiewicz, Maddison. Using Online Surveys to Capture Time-Sensitive Data in a Low-Resource Setting. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529601831.
Texto completoN, Gibbs John, Lewis Marieke, Library of Congress. Federal Research Division y United States. National Aeronautics and Space Administration. Office of Inspector General, eds. Laws governing the protection of sensitive but unclassified information: A report. Washington, D.C: Federal Research Division, Library of Congress, 2004.
Buscar texto completoMewes, Hans-Werner. Schnelle Identifizierung von Peptiden durch sensitive Bestimmung ihrer Aminosäurezusammensetzung und Zugriff auf Sequenzdatenbanken. Gauting bei München: Intemann, 1989.
Buscar texto completoUnited States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.
Buscar texto completovan der Sloot, Bart y Sascha van Schendel. The Boundaries of Data. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.
Texto completoOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Buscar texto completoNew York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.
Buscar texto completoN, Gibbs John, Lewis Marieke y Library of Congress. Federal Research Division., eds. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.
Buscar texto completoRees, Elaine. Threatened, endangered & sensitive species affected by livestock production: A preliminary survey of data available in the western states. Portland, Or: Audubon Society of Portland, 1993.
Buscar texto completoAlan, Cooper. The Mourne Environmentally Sensitive Area land use data base: Report to the Department of Agriculture for Northern Ireland. [Coleraine]: [Department of Environmental Studies, University of Ulster], 1988.
Buscar texto completoParagi, Beata. Challenges in Using Online Surveys for Research Involving Delicate/Sensitive Topics: Data Protection Practices of European NGOs Operating in the Global South. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529604146.
Texto completoUnited States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. Washington: U.S. G.P.O., 2005.
Buscar texto completoKlausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.
Buscar texto completoKlausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.
Buscar texto completoUnited States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. [Washington, D.C.]: GAO, 2006.
Buscar texto completoManaging Catastrophic Loss of Sensitive Data. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-239-3.x0001-6.
Texto completoMcNamara, Kathryn. Defense Data Network: usage sensitive billing. 1986.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.
Buscar texto completoNeumann, Caryn E. Sexual Crime. ABC-CLIO, LLC, 2009. http://dx.doi.org/10.5040/9798216013532.
Texto completoFox, James A. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Buscar texto completoFox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Buscar texto completoFox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Buscar texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, The, 2002.
Buscar texto completoStelzmann, Daniela y Josephine Ischebeck, eds. Child Sexual Abuse and the Media. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748904403.
Texto completoBritain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) (Amendment) Order 2010. Stationery Office, The, 2010.
Buscar texto completoBunner, James. Password Book: Sensitive Data in One Place / 110 Pages /. Independently Published, 2020.
Buscar texto completoCommittee on Financial Services, United States House of Representatives y United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Buscar texto completoDaniel, Wayne W. Collecting Sensitive Data by Randomized Response: An Annotated Bibliography. 2a ed. Georgia State Univ Pr, 1992.
Buscar texto completoRouting of Time-Sensitive Data in Mobile and HOC Networks. Storming Media, 2001.
Buscar texto completoDoing research on sensitive topics. London: Sage Publications, 1993.
Buscar texto completoSurvey methodology: An innovative technique for estimating sensitive survey items. Washington, D.C: The Office, 1999.
Buscar texto completoData acquisition system for linear position sensitive detector based neutron diffractometer. Mumbai: Bhabha Atomic Research Centre, 2003.
Buscar texto completoGiugni, Marco y Maria Grasso, eds. The Oxford Handbook of Political Participation. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780198861126.001.0001.
Texto completoPhotopoulos, Constantine. Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals. Elsevier Science & Technology Books, 2011.
Buscar texto completo