Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Sensitive date.

Książki na temat „Sensitive date”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych książek naukowych na temat „Sensitive date”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.

1

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Christen, Peter, Thilina Ranbaduge i Rainer Schnell. Linking Sensitive Data. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Photopoulos, Constantine. Managing catastrophic loss of sensitive data. Burlington, MA: Syngress Pub., 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Claire, Levallois-Barth, red. Sensitive data protection in the European Union. Bruxelles: Bruylant, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Office, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Great Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. London: Stationery Office, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Daniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. Wyd. 2. Atlanta, Ga: Georgia State Univ. Business Press, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Computer Security Analysts (Firm : Alexandria, Va.), red. A Methodology for certifying sensitive computer applications within federal agencies. Alexandria, Va. (PO Box 10255, Alexandria 22310): Computer Security Analysts, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

E, Tracy Paul, red. Randomized response: A method for sensitive surveys. Beverly Hills: Sage Publications, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Staszkiewicz, Maddison. Using Online Surveys to Capture Time-Sensitive Data in a Low-Resource Setting. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529601831.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

N, Gibbs John, Lewis Marieke, Library of Congress. Federal Research Division i United States. National Aeronautics and Space Administration. Office of Inspector General, red. Laws governing the protection of sensitive but unclassified information: A report. Washington, D.C: Federal Research Division, Library of Congress, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Mewes, Hans-Werner. Schnelle Identifizierung von Peptiden durch sensitive Bestimmung ihrer Aminosäurezusammensetzung und Zugriff auf Sequenzdatenbanken. Gauting bei München: Intemann, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

United States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

van der Sloot, Bart, i Sascha van Schendel. The Boundaries of Data. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.

Pełny tekst źródła
Streszczenie:
The legal domain distinguishes between different types of data and attaches a different level of protection to each of them. Thus, non-personal data are left largely unregulated, while privacy and data protection rules apply to personal data or personal information. There are stricter rules for processing sensitive personal data than for ‘ordinary’ personal data, and metadata or communications data are regulated differently than content communications data. Technological developments challenge these legal categorisations on at least three fronts: First, the lines between the categories are becoming harder to draw and more fluid. Second, working with various categories of data works well when the category a datum or dataset falls into is relatively stable. However, this is less and less so. Third, scholars increasingly question the rationale behind the various legal categorisations. This book assesses to what extent either of these strategies is feasible and to what extent alternative approaches could be developed by combining insights from three fields: technology, practice and law.
Style APA, Harvard, Vancouver, ISO itp.
15

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

New York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

N, Gibbs John, Lewis Marieke i Library of Congress. Federal Research Division., red. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Rees, Elaine. Threatened, endangered & sensitive species affected by livestock production: A preliminary survey of data available in the western states. Portland, Or: Audubon Society of Portland, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Alan, Cooper. The Mourne Environmentally Sensitive Area land use data base: Report to the Department of Agriculture for Northern Ireland. [Coleraine]: [Department of Environmental Studies, University of Ulster], 1988.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Paragi, Beata. Challenges in Using Online Surveys for Research Involving Delicate/Sensitive Topics: Data Protection Practices of European NGOs Operating in the Global South. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529604146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

United States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. Washington: U.S. G.P.O., 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Klausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Klausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

United States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. [Washington, D.C.]: GAO, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Managing Catastrophic Loss of Sensitive Data. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-239-3.x0001-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

McNamara, Kathryn. Defense Data Network: usage sensitive billing. 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Britain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Neumann, Caryn E. Sexual Crime. ABC-CLIO, LLC, 2009. http://dx.doi.org/10.5040/9798216013532.

Pełny tekst źródła
Streszczenie:
A contemporary, fact-filled resource on the historical, legal, medical, and political aspects of a wide variety of sexual crimes. Authoritative and informative, Sexual Crime: A Reference Handbook offers a thoroughly up-to-date report on an issue of extraordinary urgency. It is an expert introduction to a variety of often misunderstood crimes. Sexual Crime begins with a background chapter outlining the causes and definitions of sexual crime, legal and cultural attitudes over the past three centuries, and common myths surrounding this sensitive subject. It then offers wide ranging coverage of issues, including date rape, crimes involving male victims, rape in prison, female perpetrators, medical treatments, political ramifications, and other contemporary issues.
Style APA, Harvard, Vancouver, ISO itp.
36

Fox, James A. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Fox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Fox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Britain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, The, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Stelzmann, Daniela, i Josephine Ischebeck, red. Child Sexual Abuse and the Media. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748904403.

Pełny tekst źródła
Streszczenie:
Spectacular cases of child sexual abuse (CSA) dominate media coverage again and again, shaping our knowledge about a topic that is as sensitive as it is taboo. To date, a scholarly overview of the current state of media coverage of SBC has been lacking. This book attempts to shed light on the connections between SBCs and the media in a variety of ways, incorporating different studies and perspectives from practitioners. It thus provides a comprehensive overview of relevant issues raised in the context of CSA and the media.
Style APA, Harvard, Vancouver, ISO itp.
41

Britain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) (Amendment) Order 2010. Stationery Office, The, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Bunner, James. Password Book: Sensitive Data in One Place / 110 Pages /. Independently Published, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Committee on Financial Services, United States House of Representatives i United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Daniel, Wayne W. Collecting Sensitive Data by Randomized Response: An Annotated Bibliography. Wyd. 2. Georgia State Univ Pr, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Routing of Time-Sensitive Data in Mobile and HOC Networks. Storming Media, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Doing research on sensitive topics. London: Sage Publications, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Survey methodology: An innovative technique for estimating sensitive survey items. Washington, D.C: The Office, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Data acquisition system for linear position sensitive detector based neutron diffractometer. Mumbai: Bhabha Atomic Research Centre, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Giugni, Marco, i Maria Grasso, red. The Oxford Handbook of Political Participation. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780198861126.001.0001.

Pełny tekst źródła
Streszczenie:
Abstract The Oxford Handbook of Political Participation provides the first comprehensive, up-to-date treatment of political participation in all of its varied expressions. It covers a wide range of topics relating to the study of political participation from different disciplinary and methodological angles, such as the modes of participation, the role of the context as well as the determinants, processes, and outcomes of participation. The volume brings together the political science and political sociology tradition, on the one hand, and the social movement sociological tradition, on the other, is sensitive to theoretical and methodological pluralism as well as the most recent developments in the field, and includes discussions combining perspectives that have traditionally been treated separately in the literature as well as discussions of current trends and future directions for research in this field.
Style APA, Harvard, Vancouver, ISO itp.
50

Photopoulos, Constantine. Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals. Elsevier Science & Technology Books, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii