Livros sobre o tema "Biometric information protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Biometric information protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Encontre o texto completo da fonteMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Texto completo da fonteStefan, Katzenbeisser, e SpringerLink (Online service), eds. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteOffice, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Encontre o texto completo da fonteTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Encontre o texto completo da fontecomparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Encontre o texto completo da fonteDecker, Bart. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonte1967-, Mathuria Anish, e SpringerLink (Online service), eds. Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Encontre o texto completo da fonteJakobsson, Markus. Mobile Authentication: Problems and Solutions. New York, NY: Springer New York, 2013.
Encontre o texto completo da fonteICISC 2007 (2007 Seoul, Korea). Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Berlin: Springer, 2007.
Encontre o texto completo da fonteEric, Johnson M., e SpringerLink (Online service), eds. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.
Encontre o texto completo da fonteWeerasinghe, Dasun. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Encontre o texto completo da fonteFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Encontre o texto completo da fonteOffice, United States Government Accountability. Border security: Key unresolved issues justify reevaluation of border security surveillance technology program : report to congressional committees. Washington, D.C: U.S. Government Accountability Office, 2006.
Encontre o texto completo da fonteOffice, United States Government Accountability. Border security: Consular identification cards accepted within United States, but consistent federal guidance needed. Washington, D.C: U.S. General Accountability, 2004.
Encontre o texto completo da fonteOffice, United States Government Accountability. Border security: Stronger actions needed to assess and mitigate risks of the Visa Waiver Program : report to the chairman, Committee on the Judiciary, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2006.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Opportunities to increase coordination of air and marine assets : report to the Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. [Washington, D.C.]: U.S. Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Actions needed to strengthen management of Department of Homeland Security's Visa Security Program : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Streamlined visas mantis program has lowered burden on foreign science students and scholars, but further refinements needed : report to congressional requesters. Washington, D.C: U.S. Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Long-term strategy needed to keep pace with increasing demand for visas : report to the Committee on Oversight and Government Reform, House of Representatives. Washington, DC: United States Government Accountability Office, 2007.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Fraud risks complicate State's ability to manage Diversity Visa Program : report to the Chairman, Committee on Homeland Security, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Transformation strategy needed to address challenges facing the Federal Protective Service : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2004.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Federal Protective Service could better measure the performance of its control centers : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S Government Accountability Office, 2006.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland Security: Departmentwide integrated financial management systems remain a challenge : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2007.
Encontre o texto completo da fonteOffice, United States Government Accountability. Homeland Security: Further action needed to promote successful use of special DHS acquisition authority : report to congressional committees. Washington, D.C: GAO, 2004.
Encontre o texto completo da fonteOffice, United States Government Accountability. Homeland security: Management of first responder grant programs has improved, but challenges remain : report to the Chairman, Committee on Appropriations, House of Representatives. Washington, D.C: GAO, 2005.
Encontre o texto completo da fonteOffice, United States Government Accountability. Homeland Security: Management challenges remain in transforming immigration programs : report to Congressional committees. Washington, D.C: U.S. Government Accountability Office, 2004.
Encontre o texto completo da fonteOffice, United States Government Accountability. Homeland security: DHS' efforts to enhance first responders' all-hazards capabilities continue to evolve : report to the chairman and ranking Democratic member, Subcommittee on Economic Development, Public Buildings and Emergency Management, Committee on Transportation and Infrastructure, House of Representation. Washington, D.C: United States Government Accountability Office, 2005.
Encontre o texto completo da fonteOffice, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. Washington, D.C: U.S. Govt. Accountability Office, 2007.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland Security: Planned expendtiures for U.S. visitor and immigrant status program need to be adequately defined and justified : report to congressional committees. Washington D.C: U.S. Government Accountability Office, 2007.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Opportunities exist to enhance collaboration at 24/7 operations centers staffed by multiple DHS agencies : report to congressional requesters. Washington, D.C: U.S. States Government Accountability Office, 2006.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Agency plans, implementation, and challenges regarding the national strategy for homeland security : report to the chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Federal leadership and intergovernmental cooperation required to achieve first responder interoperable communications : report to Congressional requesters. Washington, D.C: GAO, 2004.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Successes and challenges in DHS's efforts to create an effective acquisition organization : report to congressional committees. Washington, D.C: U.S. Govt. Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Process for reporting lessons learned from seaport exercises needs further attention : report to Congressional requesters. Washington, D.C: Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program : report to Congressional committees. Washington, D.C: Government Accountability Office, 2005.
Encontre o texto completo da fonteBritain, Great. Protection of Freedoms Act 2012 (Destruction, Retention and Use of Biometric Data) (Transitional, Transitory and Saving Provisions) (Amendment) Order 2015. Stationery Office, The, 2015.
Encontre o texto completo da fonteMenevidis, Z., e S. H. Schug. Ethical Implications of the Global Use of Digitised Biomedical and Biometric Data Workshop Proceedings. IOS Press, 2011.
Encontre o texto completo da fonteShi, Yun Q. Transactions on Data Hiding and Multimedia Security VIII. Springer, 2012.
Encontre o texto completo da fonteClarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.
Encontre o texto completo da fonteWeerasinghe, Dasun. Information Security and Digital Forensics. Springer, 2010.
Encontre o texto completo da fonteJakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer, 2012.
Encontre o texto completo da fonteInformation Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers. Springer, 2012.
Encontre o texto completo da fonteCamp, L. Jean, e M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.
Encontre o texto completo da fonteAvailability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th ... Springer, 2014.
Encontre o texto completo da fonteInformation Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings. Springer, 2010.
Encontre o texto completo da fonteClarke, Nathan. Transparent User Authentication. Springer, 2011.
Encontre o texto completo da fonte