Libri sul tema "Privicy protection"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Privicy protection.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 libri per l'attività di ricerca sul tema "Privicy protection".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.

1

Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Rodrigues, Rowena, e Vagelis Papakonstantinou, a cura di. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Caloyannides, Michael A. Privacy protection and computer forensics. 2a ed. Boston: Artech House, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

George, Yee, a cura di. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Spivet, Bonnie. Protecting your privacy online. New York, NY: PowerKids Press, 2012.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Wang, Hao. Protecting Privacy in China. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21750-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Inc, Regulatory Compliance Associates, a cura di. NAFCU's protecting member privacy. Austin, Tex: Sheshunoff Information Services/Thomson Financial, 2000.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Israel. Protection of Privacy Law, 5741-1981. 2a ed. [Haifa?]: A. Greenfield-A.G. Publications, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Jøsang, Audun, Lynn Futcher e Janne Hagen, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Qu, Youyang, Mohammad Reza Nosouhi, Lei Cui e Shui Yu. Personalized Privacy Protection in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Meng, Weizhi, Simone Fischer-Hübner e Christian D. Jensen, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Janczewski, Lech Jan, e Mirosław Kutyłowski, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Federrath, Hannes, e Dieter Gollmann, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström e André Zúquete, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Hoepman, Jaap-Henk, e Stefan Katzenbeisser, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam e Thierry Sans, a cura di. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
23

De Capitani di Vimercati, Sabrina, e Fabio Martinelli, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Hölbl, Marko, Kai Rannenberg e Tatjana Welzer, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Liu, Xinxin, e Xiaolin Li. Location Privacy Protection in Mobile Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9074-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Elngar, Ahmed, Ambika Pawar e Prathamesh Churi. Data Protection and Privacy in Healthcare. A cura di Ahmed Elngar, Ambika Pawar e Prathamesh Churi. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

1943-, Rule James B., e Greenleaf G. W, a cura di. Global privacy protection: The first generation. Cheltenham, UK: Edward Elgar, 2008.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Meyer, Norbert, e Anna Grocholewska-Czuryło, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Peter, Carey. E-privacy and online data protection. London: Butterworths, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Israel. Protection of privacy law, 5741-1981. 3a ed. [Haifa]: A. Greenfield-A.G. Publications, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Kayser, Pierre. La protection de la vie privée. 2a ed. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1990.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Bainbridge, David I. EC data protection directive. London: Butterworths, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Institute, Pennsylvania Bar, a cura di. Privacy & security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Wang, Hao. Protecting privacy in China: A research on China's privacy standards and the possibility of establishing the right to privacy and the information privacy protection legislation in modern China. Heidelberg: Springer, 2011.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

1960-, Maurer Urs, e Faruque Nadine 1960-, a cura di. Datenschutz =: Protection des données = Data protection. Basel: Helbing & Lichtenhahn, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Lauter, Kristin, Wei Dai e Kim Laine, a cura di. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Livraga, Giovanni. Protecting Privacy in Data Release. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Senior, Andrew, a cura di. Protecting Privacy in Video Surveillance. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Andrew, Senior, a cura di. Protecting privacy in video surveillance. Dordrecht: Springer, 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Mooney, Carla. Online privacy and business. San Diego, CA: ReferencePoint Press, Inc., 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Noon, E. Personal Privacy Protection Guide : A Practical Guide to Protecting Your Privacy. On One Inc, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Hallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Biobanks are critical infrastructure for medical research. Biobanks, however, are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy rights and rights holders should be protected and to what extent? Since 25 May 2018, the General Data Protection Regulation (GDPR) has applied and now occupies a key position in the European legal framework for the regulation of biobanking. This book takes an in-depth look at the function, problems, and opportunities presented by European data protection law under the GDPR as a framework for the protection of genetic privacy in biobanking. It argues that the substantive framework presented by the GDPR already offers an admirable baseline level of protection for the range of genetic privacy rights engaged by biobanking. The book further contends that while numerous problems with this standard of protection are indeed identifiable, the GDPR offers the flexibility to accommodate solutions to these problems, as well as the procedural mechanisms to realise these solutions.
43

Hallinan, Dara. Protecting Genetic Privacy in Biobanking Through Data Protection Law. Oxford University Press, 2021.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Rule, James, e Graham Greenleaf. Global Privacy Protection. Edward Elgar Publishing, 2008. http://dx.doi.org/10.4337/9781848445123.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Protecting privacy. Oxford: Oxford University Press, 1999.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Santiago, J. K. !nternet Privacy Protection Guide. Boggy Cove Pub, 1999.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Wacks, Raymond. 6. The death of privacy? Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0006.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Privacy is under attack from several quarters. The ‘war on terror’ has amplified this pressure. The Internet, increased surveillance, and sensationalist journalism seriously undermine individuals’ control over their private lives. Many advocates believe that the protection of privacy stands in need of urgent renewal. Has the Internet sounded privacy’s death knell? The rapid advance of information technology, especially the Internet, has generated widespread concern about protection of personal data, with many jurisdictions adopting data protection legislation. Ironically, technology generates both the malady and part of the cure. While the law is rarely an effective tool against the dedicated intruder, advances in protective software, along with fair information practices of the European Directive and laws of several jurisdictions, afford a rational and sound normative framework for the collection, use, and transfer of personal data. Some of these questions—likely to dominate 21st-century discussions of privacy—are considered in this concluding chapter.
48

Newman, Bobbi, e Bonnie Tijerina. Protecting Patron Privacy. Rowman & Littlefield Publishers, Incorporated, 2017.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Donnellan, Craig. Protecting Our Privacy. Independence Educational Publishers, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Beckstrom, Matthew. Protecting Patron Privacy. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216002277.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research―if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

Vai alla bibliografia