Livres sur le sujet « Biometric information protection »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs livres pour votre recherche sur le sujet « Biometric information protection ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les livres sur diverses disciplines et organisez correctement votre bibliographie.
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2012.
Trouver le texte intégralMaksurov, Aleksey. Ensuring information security on the Internet. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Texte intégralStefan, Katzenbeisser, et SpringerLink (Online service), dir. Transactions on Data Hiding and Multimedia Security VIII : Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
Trouver le texte intégralOffice, United States Government Accountability. Border security : State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C : United States Government Accountability Office, 2004.
Trouver le texte intégralTransparent user authentication : Biometrics, RFID and behavioural profiling. London : Springer, 2011.
Trouver le texte intégralcomparé, Institut suisse de droit. L'individu face aux nouvelles technologies : Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche : Schulthess, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C : United States Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C : United States Government Accountability Office, 2004.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland Security : Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C : U.S. Government Accountability Office, 2006.
Trouver le texte intégralDecker, Bart. Communications and Multimedia Security : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
Trouver le texte intégral1967-, Mathuria Anish, et SpringerLink (Online service), dir. Information Systems Security : 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Trouver le texte intégralJakobsson, Markus. Mobile Authentication : Problems and Solutions. New York, NY : Springer New York, 2013.
Trouver le texte intégralICISC 2007 (2007 Seoul, Korea). Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Berlin : Springer, 2007.
Trouver le texte intégralEric, Johnson M., et SpringerLink (Online service), dir. The Economics of Financial and Medical Identity Theft. Boston, MA : Springer US, 2012.
Trouver le texte intégralWeerasinghe, Dasun. Information Security and Digital Forensics : First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2010.
Trouver le texte intégralFischer-Hübner, Simone. Policies and Research in Identity Management : Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.
Trouver le texte intégralOffice, United States Government Accountability. Border security : Key unresolved issues justify reevaluation of border security surveillance technology program : report to congressional committees. Washington, D.C : U.S. Government Accountability Office, 2006.
Trouver le texte intégralOffice, United States Government Accountability. Border security : Consular identification cards accepted within United States, but consistent federal guidance needed. Washington, D.C : U.S. General Accountability, 2004.
Trouver le texte intégralOffice, United States Government Accountability. Border security : Stronger actions needed to assess and mitigate risks of the Visa Waiver Program : report to the chairman, Committee on the Judiciary, House of Representatives. Washington, D.C : U.S. Govt. Accountability Office, 2006.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Opportunities to increase coordination of air and marine assets : report to the Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. [Washington, D.C.] : U.S. Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Actions needed to strengthen management of Department of Homeland Security's Visa Security Program : report to Congressional committees. Washington, D.C : U.S. Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Streamlined visas mantis program has lowered burden on foreign science students and scholars, but further refinements needed : report to congressional requesters. Washington, D.C : U.S. Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Long-term strategy needed to keep pace with increasing demand for visas : report to the Committee on Oversight and Government Reform, House of Representatives. Washington, DC : United States Government Accountability Office, 2007.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Fraud risks complicate State's ability to manage Diversity Visa Program : report to the Chairman, Committee on Homeland Security, House of Representatives. Washington, D.C : U.S. Govt. Accountability Office, 2007.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Transformation strategy needed to address challenges facing the Federal Protective Service : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C : GAO, 2004.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Federal Protective Service could better measure the performance of its control centers : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C : U.S Government Accountability Office, 2006.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland Security : Departmentwide integrated financial management systems remain a challenge : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C : GAO, 2007.
Trouver le texte intégralOffice, United States Government Accountability. Homeland Security : Further action needed to promote successful use of special DHS acquisition authority : report to congressional committees. Washington, D.C : GAO, 2004.
Trouver le texte intégralOffice, United States Government Accountability. Homeland security : Management of first responder grant programs has improved, but challenges remain : report to the Chairman, Committee on Appropriations, House of Representatives. Washington, D.C : GAO, 2005.
Trouver le texte intégralOffice, United States Government Accountability. Homeland Security : Management challenges remain in transforming immigration programs : report to Congressional committees. Washington, D.C : U.S. Government Accountability Office, 2004.
Trouver le texte intégralOffice, United States Government Accountability. Homeland security : DHS' efforts to enhance first responders' all-hazards capabilities continue to evolve : report to the chairman and ranking Democratic member, Subcommittee on Economic Development, Public Buildings and Emergency Management, Committee on Transportation and Infrastructure, House of Representation. Washington, D.C : United States Government Accountability Office, 2005.
Trouver le texte intégralOffice, United States Government Accountability. Homeland Security : Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. Washington, D.C : U.S. Govt. Accountability Office, 2007.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland Security : Planned expendtiures for U.S. visitor and immigrant status program need to be adequately defined and justified : report to congressional committees. Washington D.C : U.S. Government Accountability Office, 2007.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Opportunities exist to enhance collaboration at 24/7 operations centers staffed by multiple DHS agencies : report to congressional requesters. Washington, D.C : U.S. States Government Accountability Office, 2006.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Agency plans, implementation, and challenges regarding the national strategy for homeland security : report to the chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. Washington, D.C : U.S. Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Federal leadership and intergovernmental cooperation required to achieve first responder interoperable communications : report to Congressional requesters. Washington, D.C : GAO, 2004.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Successes and challenges in DHS's efforts to create an effective acquisition organization : report to congressional committees. Washington, D.C : U.S. Govt. Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Process for reporting lessons learned from seaport exercises needs further attention : report to Congressional requesters. Washington, D.C : Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program : report to Congressional committees. Washington, D.C : Government Accountability Office, 2005.
Trouver le texte intégralBritain, Great. Protection of Freedoms Act 2012 (Destruction, Retention and Use of Biometric Data) (Transitional, Transitory and Saving Provisions) (Amendment) Order 2015. Stationery Office, The, 2015.
Trouver le texte intégralEthical Implications of the Global Use of Digitised Biomedical and Biometric Data Workshop Proceedings. IOS Press, 2011.
Trouver le texte intégralShi, Yun Q. Transactions on Data Hiding and Multimedia Security VIII. Springer, 2012.
Trouver le texte intégralClarke, Nathan. Transparent User Authentication : Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.
Trouver le texte intégralWeerasinghe, Dasun. Information Security and Digital Forensics. Springer, 2010.
Trouver le texte intégralJakobsson, Markus. Mobile Authentication : Problems and Solutions. Springer, 2012.
Trouver le texte intégralInformation Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers. Springer, 2012.
Trouver le texte intégralCamp, L. Jean, et M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.
Trouver le texte intégralAvailability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th ... Springer, 2014.
Trouver le texte intégralInformation Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings. Springer, 2010.
Trouver le texte intégralClarke, Nathan. Transparent User Authentication. Springer, 2011.
Trouver le texte intégral