Libri sul tema "Privicy protection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Privicy protection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.
South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.
South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.
Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.
Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.
Rodrigues, Rowena, e Vagelis Papakonstantinou, a cura di. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.
Caloyannides, Michael A. Privacy protection and computer forensics. 2a ed. Boston: Artech House, 2004.
Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.
George, Yee, a cura di. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.
Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.
Spivet, Bonnie. Protecting your privacy online. New York, NY: PowerKids Press, 2012.
Wang, Hao. Protecting Privacy in China. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21750-0.
Inc, Regulatory Compliance Associates, a cura di. NAFCU's protecting member privacy. Austin, Tex: Sheshunoff Information Services/Thomson Financial, 2000.
Israel. Protection of Privacy Law, 5741-1981. 2a ed. [Haifa?]: A. Greenfield-A.G. Publications, 1994.
Jøsang, Audun, Lynn Futcher e Janne Hagen, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.
Qu, Youyang, Mohammad Reza Nosouhi, Lei Cui e Shui Yu. Personalized Privacy Protection in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6.
Meng, Weizhi, Simone Fischer-Hübner e Christian D. Jensen, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8.
Janczewski, Lech Jan, e Mirosław Kutyłowski, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.
Federrath, Hannes, e Dieter Gollmann, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.
Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström e André Zúquete, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.
Hoepman, Jaap-Henk, e Stefan Katzenbeisser, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.
Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam e Thierry Sans, a cura di. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.
De Capitani di Vimercati, Sabrina, e Fabio Martinelli, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.
Hölbl, Marko, Kai Rannenberg e Tatjana Welzer, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.
Liu, Xinxin, e Xiaolin Li. Location Privacy Protection in Mobile Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9074-6.
Elngar, Ahmed, Ambika Pawar e Prathamesh Churi. Data Protection and Privacy in Healthcare. A cura di Ahmed Elngar, Ambika Pawar e Prathamesh Churi. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848.
1943-, Rule James B., e Greenleaf G. W, a cura di. Global privacy protection: The first generation. Cheltenham, UK: Edward Elgar, 2008.
Meyer, Norbert, e Anna Grocholewska-Czuryło, a cura di. ICT Systems Security and Privacy Protection. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3.
Peter, Carey. E-privacy and online data protection. London: Butterworths, 2002.
Israel. Protection of privacy law, 5741-1981. 3a ed. [Haifa]: A. Greenfield-A.G. Publications, 1994.
Kayser, Pierre. La protection de la vie privée. 2a ed. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1990.
Bainbridge, David I. EC data protection directive. London: Butterworths, 1996.
Institute, Pennsylvania Bar, a cura di. Privacy & security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2007.
Wang, Hao. Protecting privacy in China: A research on China's privacy standards and the possibility of establishing the right to privacy and the information privacy protection legislation in modern China. Heidelberg: Springer, 2011.
1960-, Maurer Urs, e Faruque Nadine 1960-, a cura di. Datenschutz =: Protection des données = Data protection. Basel: Helbing & Lichtenhahn, 1994.
Lauter, Kristin, Wei Dai e Kim Laine, a cura di. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.
Livraga, Giovanni. Protecting Privacy in Data Release. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9.
Senior, Andrew, a cura di. Protecting Privacy in Video Surveillance. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3.
Andrew, Senior, a cura di. Protecting privacy in video surveillance. Dordrecht: Springer, 2009.
Mooney, Carla. Online privacy and business. San Diego, CA: ReferencePoint Press, Inc., 2015.
Noon, E. Personal Privacy Protection Guide : A Practical Guide to Protecting Your Privacy. On One Inc, 1998.
Hallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.
Hallinan, Dara. Protecting Genetic Privacy in Biobanking Through Data Protection Law. Oxford University Press, 2021.
Rule, James, e Graham Greenleaf. Global Privacy Protection. Edward Elgar Publishing, 2008. http://dx.doi.org/10.4337/9781848445123.
Protecting privacy. Oxford: Oxford University Press, 1999.
Santiago, J. K. !nternet Privacy Protection Guide. Boggy Cove Pub, 1999.
Wacks, Raymond. 6. The death of privacy? Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0006.
Newman, Bobbi, e Bonnie Tijerina. Protecting Patron Privacy. Rowman & Littlefield Publishers, Incorporated, 2017.
Donnellan, Craig. Protecting Our Privacy. Independence Educational Publishers, 2004.
Beckstrom, Matthew. Protecting Patron Privacy. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216002277.