Książki na temat „Privicy protection”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Privicy protection.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych książek naukowych na temat „Privicy protection”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.

1

Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Rodrigues, Rowena, i Vagelis Papakonstantinou, red. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

A, Caloyannides Michael, red. Privacy protection and computer forensics. Wyd. 2. Boston: Artech House, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

George, Yee, red. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Spivet, Bonnie. Protecting your privacy online. New York, NY: PowerKids Press, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Wang, Hao. Protecting Privacy in China. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21750-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Inc, Regulatory Compliance Associates, red. NAFCU's protecting member privacy. Austin, Tex: Sheshunoff Information Services/Thomson Financial, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Israel. Protection of Privacy Law, 5741-1981. Wyd. 2. [Haifa?]: A. Greenfield-A.G. Publications, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Jøsang, Audun, Lynn Futcher i Janne Hagen, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Qu, Youyang, Mohammad Reza Nosouhi, Lei Cui i Shui Yu. Personalized Privacy Protection in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Meng, Weizhi, Simone Fischer-Hübner i Christian D. Jensen, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Janczewski, Lech Jan, i Mirosław Kutyłowski, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Federrath, Hannes, i Dieter Gollmann, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström i André Zúquete, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Hoepman, Jaap-Henk, i Stefan Katzenbeisser, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam i Thierry Sans, red. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

De Capitani di Vimercati, Sabrina, i Fabio Martinelli, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Hölbl, Marko, Kai Rannenberg i Tatjana Welzer, red. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Liu, Xinxin, i Xiaolin Li. Location Privacy Protection in Mobile Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9074-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Elngar, Ahmed, Ambika Pawar i Prathamesh Churi. Data Protection and Privacy in Healthcare. Redaktorzy Ahmed Elngar, Ambika Pawar i Prathamesh Churi. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

1943-, Rule James B., i Greenleaf G. W, red. Global privacy protection: The first generation. Cheltenham, UK: Edward Elgar, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Meyer, Norbert, i Anna Grocholewska-Czuryło, red. ICT Systems Security and Privacy Protection. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Peter, Carey. E-privacy and online data protection. London: Butterworths, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Israel. Protection of privacy law, 5741-1981. Wyd. 3. [Haifa]: A. Greenfield-A.G. Publications, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Kayser, Pierre. La protection de la vie privée. Wyd. 2. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Bainbridge, David I. EC data protection directive. London: Butterworths, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Institute, Pennsylvania Bar, red. Privacy & security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Wang, Hao. Protecting privacy in China: A research on China's privacy standards and the possibility of establishing the right to privacy and the information privacy protection legislation in modern China. Heidelberg: Springer, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

1960-, Maurer Urs, i Faruque Nadine 1960-, red. Datenschutz =: Protection des données = Data protection. Basel: Helbing & Lichtenhahn, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Lauter, Kristin, Wei Dai i Kim Laine, red. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Livraga, Giovanni. Protecting Privacy in Data Release. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Senior, Andrew, red. Protecting Privacy in Video Surveillance. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Andrew, Senior, red. Protecting privacy in video surveillance. Dordrecht: Springer, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Online privacy and business. San Diego, CA: ReferencePoint Press, Inc., 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Noon, E. Personal Privacy Protection Guide : A Practical Guide to Protecting Your Privacy. On One Inc, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Hallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.

Pełny tekst źródła
Streszczenie:
Biobanks are critical infrastructure for medical research. Biobanks, however, are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy rights and rights holders should be protected and to what extent? Since 25 May 2018, the General Data Protection Regulation (GDPR) has applied and now occupies a key position in the European legal framework for the regulation of biobanking. This book takes an in-depth look at the function, problems, and opportunities presented by European data protection law under the GDPR as a framework for the protection of genetic privacy in biobanking. It argues that the substantive framework presented by the GDPR already offers an admirable baseline level of protection for the range of genetic privacy rights engaged by biobanking. The book further contends that while numerous problems with this standard of protection are indeed identifiable, the GDPR offers the flexibility to accommodate solutions to these problems, as well as the procedural mechanisms to realise these solutions.
Style APA, Harvard, Vancouver, ISO itp.
43

Protecting Genetic Privacy in Biobanking Through Data Protection Law. Oxford University Press, 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Rule, James, i Graham Greenleaf. Global Privacy Protection. Edward Elgar Publishing, 2008. http://dx.doi.org/10.4337/9781848445123.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Protecting privacy. Oxford: Oxford University Press, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Santiago, J. K. !nternet Privacy Protection Guide. Boggy Cove Pub, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Wacks, Raymond. 6. The death of privacy? Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0006.

Pełny tekst źródła
Streszczenie:
Privacy is under attack from several quarters. The ‘war on terror’ has amplified this pressure. The Internet, increased surveillance, and sensationalist journalism seriously undermine individuals’ control over their private lives. Many advocates believe that the protection of privacy stands in need of urgent renewal. Has the Internet sounded privacy’s death knell? The rapid advance of information technology, especially the Internet, has generated widespread concern about protection of personal data, with many jurisdictions adopting data protection legislation. Ironically, technology generates both the malady and part of the cure. While the law is rarely an effective tool against the dedicated intruder, advances in protective software, along with fair information practices of the European Directive and laws of several jurisdictions, afford a rational and sound normative framework for the collection, use, and transfer of personal data. Some of these questions—likely to dominate 21st-century discussions of privacy—are considered in this concluding chapter.
Style APA, Harvard, Vancouver, ISO itp.
48

Protecting Patron Privacy. Rowman & Littlefield Publishers, Incorporated, 2017.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Protecting Our Privacy. Independence Educational Publishers, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Beckstrom, Matthew. Protecting Patron Privacy. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216002277.

Pełny tekst źródła
Streszczenie:
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research―if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii