Książki na temat „Biometric information protection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych książek naukowych na temat „Biometric information protection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Znajdź pełny tekst źródłaMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Pełny tekst źródłaStefan, Katzenbeisser, i SpringerLink (Online service), red. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Znajdź pełny tekst źródłaTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Znajdź pełny tekst źródłacomparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Znajdź pełny tekst źródła1951-, Chadwick David, i SpringerLink (Online service), red. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Znajdź pełny tekst źródła1967-, Mathuria Anish, i SpringerLink (Online service), red. Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Znajdź pełny tekst źródłaJakobsson, Markus. Mobile Authentication: Problems and Solutions. New York, NY: Springer New York, 2013.
Znajdź pełny tekst źródłaKil-Hyun, Nam, i Rhee Gwangsoo, red. Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Berlin: Springer, 2007.
Znajdź pełny tekst źródłaEric, Johnson M., i SpringerLink (Online service), red. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.
Znajdź pełny tekst źródłaWeerasinghe, Dasun. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Znajdź pełny tekst źródłaFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Border security: Key unresolved issues justify reevaluation of border security surveillance technology program : report to congressional committees. Washington, D.C: U.S. Government Accountability Office, 2006.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Border security: Consular identification cards accepted within United States, but consistent federal guidance needed. Washington, D.C: U.S. General Accountability, 2004.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Border security: Stronger actions needed to assess and mitigate risks of the Visa Waiver Program : report to the chairman, Committee on the Judiciary, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2006.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Opportunities to increase coordination of air and marine assets : report to the Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. [Washington, D.C.]: U.S. Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Actions needed to strengthen management of Department of Homeland Security's Visa Security Program : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Streamlined visas mantis program has lowered burden on foreign science students and scholars, but further refinements needed : report to congressional requesters. Washington, D.C: U.S. Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Long-term strategy needed to keep pace with increasing demand for visas : report to the Committee on Oversight and Government Reform, House of Representatives. Washington, DC: United States Government Accountability Office, 2007.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Fraud risks complicate State's ability to manage Diversity Visa Program : report to the Chairman, Committee on Homeland Security, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Transformation strategy needed to address challenges facing the Federal Protective Service : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2004.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Federal Protective Service could better measure the performance of its control centers : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S Government Accountability Office, 2006.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland Security: Departmentwide integrated financial management systems remain a challenge : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2007.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Homeland Security: Further action needed to promote successful use of special DHS acquisition authority : report to congressional committees. Washington, D.C: GAO, 2004.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Homeland security: Management of first responder grant programs has improved, but challenges remain : report to the Chairman, Committee on Appropriations, House of Representatives. Washington, D.C: GAO, 2005.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Homeland Security: Management challenges remain in transforming immigration programs : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2004.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Homeland security: DHS' efforts to enhance first responders' all-hazards capabilities continue to evolve : report to the chairman and ranking Democratic member, Subcommittee on Economic Development, Public Buildings and Emergency Management, Committee on Transportation and Infrastructure, House of Representation. Washington, D.C: United States Government Accountability Office, 2005.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland Security: Planned expendtiures for U.S. visitor and immigrant status program need to be adequately defined and justified : report to congressional committees. Washington D.C: U.S. Government Accountability Office, 2007.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Opportunities exist to enhance collaboration at 24/7 operations centers staffed by multiple DHS agencies : report to congressional requesters. Washington, D.C: U.S. States Government Accountability Office, 2006.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Agency plans, implementation, and challenges regarding the national strategy for homeland security : report to the chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Federal leadership and intergovernmental cooperation required to achieve first responder interoperable communications : report to Congressional requesters. Washington, D.C: GAO, 2004.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Successes and challenges in DHS's efforts to create an effective acquisition organization : report to congressional committees. Washington, D.C: U.S. Govt. Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Process for reporting lessons learned from seaport exercises needs further attention : report to Congressional requesters. Washington, D.C: Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program : report to Congressional committees. Washington, D.C: Government Accountability Office, 2005.
Znajdź pełny tekst źródłaBritain, Great. Protection of Freedoms Act 2012 (Destruction, Retention and Use of Biometric Data) (Transitional, Transitory and Saving Provisions) (Amendment) Order 2015. Stationery Office, The, 2015.
Znajdź pełny tekst źródłaEthical Implications of the Global Use of Digitised Biomedical and Biometric Data Workshop Proceedings. IOS Press, 2011.
Znajdź pełny tekst źródłaShi, Yun Q. Transactions on Data Hiding and Multimedia Security VIII. Springer, 2012.
Znajdź pełny tekst źródłaClarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.
Znajdź pełny tekst źródłaWeerasinghe, Dasun. Information Security and Digital Forensics. Springer, 2010.
Znajdź pełny tekst źródłaJakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer, 2012.
Znajdź pełny tekst źródłaInformation Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers. Springer, 2012.
Znajdź pełny tekst źródłaCamp, L. Jean, i M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.
Znajdź pełny tekst źródłaAvailability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th ... Springer, 2014.
Znajdź pełny tekst źródłaInformation Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings. Springer, 2010.
Znajdź pełny tekst źródłaClarke, Nathan. Transparent User Authentication. Springer, 2011.
Znajdź pełny tekst źródła