Libri sul tema "Breaches"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Breaches".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Daswani, Neil, e Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Testo completoS, Logweller Cary, a cura di. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Cerca il testo completoFoster, Peter C., Sara E. Cable, Kathleen M. Porter e Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Cerca il testo completoPersonal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Cerca il testo completoArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Cerca il testo completoVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Testo completoWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Testo completoRita, Tehan, a cura di. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Cerca il testo completoKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.
Cerca il testo completoGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.
Cerca il testo completoRussell, Shumway, a cura di. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.
Cerca il testo completoOmbudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.
Cerca il testo completoBelling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.
Testo completoBridging Love's Breaches. iUniverse, Inc., 2004.
Cerca il testo completoY, Chow Stephen, Anthony Barbara B e Massachusetts Continuing Legal Education, Inc. (1982- ), a cura di. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Cerca il testo completoY, Chow Stephen, Anthony Barbara B e Massachusetts Continuing Legal Education, Inc. (1982- ), a cura di. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Cerca il testo completoDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Cerca il testo completoDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Cerca il testo completoFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Cerca il testo completoData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Cerca il testo completoCentre, National Computing, a cura di. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.
Cerca il testo completoElbayadi, Moudy, e Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.
Cerca il testo completoFlanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.
Testo completoKelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.
Cerca il testo completoHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Cerca il testo completoHo, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.
Cerca il testo completoHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Cerca il testo completoCommittee on Energy and Commerce, United States House of Representatives e United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Cerca il testo completoWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Cerca il testo completoHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Cerca il testo completoPublishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.
Cerca il testo completoMoore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.
Cerca il testo completoScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Cerca il testo completoDanae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.
Testo completoJustice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.
Cerca il testo completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Cerca il testo completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Cerca il testo completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Cerca il testo completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Cerca il testo completoRicento, Thomas, Yael Peled e Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.
Cerca il testo completoData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Cerca il testo completoRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Cerca il testo completoCommittee on Financial Services, United States House of Representatives e United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Cerca il testo completoRicento, Thomas, Yael Peled e Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.
Cerca il testo completoInformation Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.
Cerca il testo completoWalker, John, e Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.
Cerca il testo completoLibrary, Harvard College, a cura di. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.
Cerca il testo completoData Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.
Cerca il testo completoJeyanthi, N., e R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.
Cerca il testo completoCombating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.
Cerca il testo completo